-
2
-
-
84898960610
-
Completeness theorems for non cryptographic fault tolerant distributed computation
-
M. Ben-Or, S. Goldwasser and A. Wigderson, Completeness theorems for non cryptographic fault tolerant distributed computation, 20th STOC, (1988), 1-9.
-
(1988)
20Th STOC
, pp. 1-9
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
3
-
-
84958639277
-
Efficient generation of shared RSA keys
-
Springer-Verlag
-
D. Boneh and M. Franklin, Efficient generation of shared RSA keys, Proc. of Crypto’ 97, LNCS, Vol. 1233, Springer-Verlag, pp. 425-439, 1997.
-
(1997)
Proc. Of Crypto’ 97, LNCS
, vol.1233
, pp. 425-439
-
-
Boneh, D.1
Franklin, M.2
-
4
-
-
35048837958
-
Security and Composition of Multi-party Cryptographic Protocols
-
Theory of Cryptography Library
-
R. Canetti, Security and Composition of Multi-party Cryptographic Protocols. To appear in the Journal of Cryptology. Available from the Theory of Cryptography Library at http://philby.ucsd.edu/cryptlib, 1998.
-
(1998)
To Appear in the Journal of Cryptology
-
-
Canetti, R.1
-
6
-
-
0029541045
-
Private Information Retrieval
-
B. Chor, O. Goldreich, E. Kushilevitz and M. Sudan, Private Information Retrieval, 36th FOCS, pp. 41-50, 1995.
-
(1995)
36Th FOCS
, pp. 41-50
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
7
-
-
84974538320
-
-
R. Cramer, N. Gilboa, M. Naor, B. Pinkas and G. Poupard, Oblivious Polynomial Evaluation, 2000.
-
(2000)
Oblivious Polynomial Evaluation
-
-
Cramer, R.1
Gilboa, N.2
Naor, M.3
Pinkas, B.4
Poupard, G.5
-
8
-
-
0022080529
-
A Randomized Protocol for Signing Contracts
-
S. Even, O. Goldreich and A. Lempel, A Randomized Protocol for Signing Contracts, Communications of the ACM 28, pp. 637-647, 1985.
-
(1985)
Communications of the ACM
, vol.28
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
9
-
-
0030150177
-
Comparing Information Without Leaking It
-
May
-
R. Fagin, M. Naor and P. Winkler, Comparing Information Without Leaking It, Communications of the ACM, vol 39, May 1996, pp. 77-85.
-
(1996)
Communications of the ACM
, vol.39
, pp. 77-85
-
-
Fagin, R.1
Naor, M.2
Winkler, P.3
-
11
-
-
84957104180
-
Key Generation, Proc of Crypto ’99
-
Springer-Verlag
-
N. Gilboa, Two Party RSA Key Generation, Proc of Crypto ’99, Lecture Notes in Computer Science, Vol. 1666, Springer-Verlag, pp. 116-129, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1666
, pp. 116-129
-
-
Gilboa, N.1
Two Party, R.2
-
16
-
-
0032669864
-
Oblivious Transfer and Polynomial Evaluation
-
Atlanta, GA, May 1-4
-
M. Naor and B. Pinkas, Oblivious Transfer and Polynomial Evaluation, Proc. of the 31st STOC, Atlanta, GA, pp. 245-254, May 1-4, 1999.
-
(1999)
Proc. Of the 31St STOC
, pp. 245-254
-
-
Naor, M.1
Pinkas, B.2
-
18
-
-
84942550998
-
Public-Key Cryptosystems Based on Composite Degree Residuocity Classes
-
P. Paillier, Public-Key Cryptosystems Based on Composite Degree Residuocity Classes. Proc. of Eurocrypt ’99, LNCS Vol. 1592, pp. 223-238, 1999.
-
(1999)
Proc. Of Eurocrypt ’99, LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
19
-
-
33744584654
-
Induction of Decision Trees
-
J. Ross Quinlan, Induction of Decision Trees. Machine Learning 1(1): 81-106(1986)
-
(1986)
Machine Learning
, vol.1
, Issue.1
, pp. 81-106
-
-
Ross Quinlan, J.1
|