-
1
-
-
0002382799
-
Foundations of Secure Interactive Computing
-
D. Beaver, Foundations of Secure Interactive Computing. Proc. Of CRYPTO’91, pp. 377-391, 1991.
-
(1991)
Proc. Of CRYPTO’91
, pp. 377-391
-
-
Beaver, D.1
-
2
-
-
33746365751
-
Secure multi-party protocols and zero-knowledge proof systems tolerating a faulty majority
-
D. Beaver, Secure multi-party protocols and zero-knowledge proof systems tolerating a faulty majority. Journal of Cryptology, 4(2), pp. 75-122, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.2
, pp. 75-122
-
-
Beaver, D.1
-
3
-
-
0024769014
-
Multi-party computation with faulty majority
-
D. Beaver and S. Goldwasser, Multi-party computation with faulty majority, Proc. Of the 30th FOCS, pp. 468-473, 1989.
-
(1989)
Proc. Of the 30Th FOCS
, pp. 468-473
-
-
Beaver, D.1
Goldwasser, S.2
-
4
-
-
84898960610
-
Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation
-
M. Ben-Or, S. Goldwasser and A. Wigderson, Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation, Proc. Of the 20th STOC, pp. 1-10, 1998.
-
(1998)
Proc. Of the 20Th STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
5
-
-
0000731055
-
Security and Composition of Multi-party Cryptographic Protocols
-
R. Canetti, Security and Composition of Multi-party Cryptographic Protocols. Journal of Cryptology, 13(1):143-202.
-
Journal of Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
8
-
-
84948975649
-
General secure multiparty computation from any linear secret-sharing scheme
-
R. Cramer, U. Maurer, and I. Damgård, General secure multiparty computation from any linear secret-sharing scheme, Proc. EUROCRYPT’00, pp. 316-334, 2000.
-
(2000)
Proc. EUROCRYPT’00
, pp. 316-334
-
-
Cramer, R.1
Maurer, U.2
Damgård, I.3
-
10
-
-
0031210863
-
Optimal algorithms for Byzantine agreement
-
P. Feldman and S. Micali, Optimal algorithms for Byzantine agreement, SIAM J. On Computing, 26(4):873-933, 1997.
-
(1997)
SIAM J. On Computing
, vol.26
, Issue.4
, pp. 873-933
-
-
Feldman, P.1
Micali, S.2
-
11
-
-
33747194089
-
Fair computation of general functions in presence of immoral majority
-
S. Goldwasser and L. Levin, Fair computation of general functions in presence of immoral majority, Proc. CRYPTO ’90, pp. 75-84, 1990.
-
(1990)
Proc. CRYPTO ’90
, pp. 75-84
-
-
Goldwasser, S.1
Levin, L.2
-
14
-
-
0033725451
-
Reducibility and Completeness in Private Computations
-
1991 by Kilian and in Proc. Of the 35th FOCS, 1994 by Kushilevitz, Micali and Ostrovsky
-
K. Kilian, E. Kushilevitz, S. Micali and R. Ostrovsky, Reducibility and Completeness in Private Computations, To appear in SIAM J. On Computing, preliminary versions in Proc. Of the 23rd STOC, 1991 by Kilian and in Proc. Of the 35th FOCS, 1994 by Kushilevitz, Micali and Ostrovsky.
-
To Appear in SIAM J. On Computing, Preliminary Versions in Proc. Of the 23Rd STOC
-
-
Kilian, K.1
Kushilevitz, E.2
Micali, S.3
Ostrovsky, R.4
-
15
-
-
0002187139
-
Secure computation
-
Also in Workshop On Multi-Party Secure Computation, Weizmann Institute, Israel, 1998
-
S. Micali and P. Rogaway, Secure computation, Proc. CRYPTO ’91, pp. 392-404, 1991. Also in Workshop On Multi-Party Secure Computation, Weizmann Institute, Israel, 1998.
-
(1991)
Proc. CRYPTO ’91
, pp. 392-404
-
-
Micali, S.1
Rogaway, P.2
-
16
-
-
84974565779
-
Verifiable Secret Sharing and Multi-party Protocols with Honest Majority
-
T. Rabin and M. Ben-Or, Verifiable Secret Sharing and Multi-party Protocols with Honest Majority, Proc. Of 21st STOC, pp. 75-83, 1989.
-
(1989)
Proc. Of 21St STOC
, pp. 75-83
-
-
Rabin, T.1
Ben-Or, M.2
-
17
-
-
0020312165
-
Protocols for secure computation
-
A. Yao, Protocols for secure computation, Proc. Of the 23rd FOCS, pp. 160-164, 1982.
-
(1982)
Proc. Of the 23Rd FOCS
, pp. 160-164
-
-
Yao, A.1
|