-
2
-
-
84923639624
-
Computing discrete logarithms in F36-137 and F36-163 using magma
-
G. Adj, A. Menezes, T. Oliveira and F. Rodriguez-Henriquez, Computing discrete logarithms in F36-137 and F36-163 using magma, in Proc. 5th Int. Workshop Arithmetic Finite Fields, 2015, pp. 3-22.
-
(2015)
Proc. 5th Int. Workshop Arithmetic Finite Fields
, pp. 3-22
-
-
Adj, G.1
Menezes, A.2
Oliveira, T.3
Rodriguez-Henriquez, F.4
-
3
-
-
77956778645
-
Secure outsourcing of scientific computations
-
M. J. Atallah, K. N. Pantazopoulos, J. R. Rice, and E. H. Spafford, Secure outsourcing of scientific computations, Adv. Comput., vol. 54, pp. 216-272, 2001.
-
(2001)
Adv. Comput.
, vol.54
, pp. 216-272
-
-
Atallah, M.J.1
Pantazopoulos, K.N.2
Rice, J.R.3
Spafford, E.H.4
-
4
-
-
27644520949
-
Secure outsourcing of sequence comparisons
-
M. J. Atallah and J. Li, Secure outsourcing of sequence comparisons, Int. J. Inf. Security, vol. 4, pp. 277-287, 2005.
-
(2005)
Int. J. Inf. Security
, vol.4
, pp. 277-287
-
-
Atallah, M.J.1
Li, J.2
-
7
-
-
0142156713
-
Variations of Diffie-Hellman problem
-
F. Bao, R. Deng, and H. Zhu, Variations of Diffie-Hellman problem, in Proc. 5th Int. Conf. Inf. Commun. Security, 2003, pp. 301-312.
-
(2003)
Proc. 5th Int. Conf. Inf. Commun. Security
, pp. 301-312
-
-
Bao, F.1
Deng, R.2
Zhu, H.3
-
8
-
-
84889045277
-
Verifiable delegation of computation on outsourced data
-
M. Backes, D. Fiore, and R. M. Reischuk, Verifiable delegation of computation on outsourced data, in Proc. ACM SIGSAC Conf. Comput. Commun. Security, 2013, pp. 863-874.
-
(2013)
Proc. ACM SIGSAC Conf. Comput. Commun. Security
, pp. 863-874
-
-
Backes, M.1
Fiore, D.2
Reischuk, R.M.3
-
9
-
-
84898945449
-
Multiprover interactive proofs: How to remove intractability assumptions
-
M. Ben-Or, S. Goldwasser, J. Kilian, and A. Wigderson, Multiprover interactive proofs: How to remove intractability assumptions, in Proc. ACM Symp. Theory Comput., 1988, pp. 113-131.
-
(1988)
Proc. ACM Symp. Theory Comput
, pp. 113-131
-
-
Ben-Or, M.1
Goldwasser, S.2
Kilian, J.3
Wigderson, A.4
-
10
-
-
85024585723
-
Incremental cryptography: The case of hashing and signing
-
M. Bellare, O. Goldreich, and S. Goldwasser, Incremental cryptography: The case of hashing and signing, in Proc. 14th Annu. Int. Cryptol. Conf. Adv. Cryptol., 1994, pp. 216-233.
-
(1994)
Proc. 14th Annu. Int. Cryptol. Conf. Adv. Cryptol
, pp. 216-233
-
-
Bellare, M.1
Goldreich, O.2
Goldwasser, S.3
-
11
-
-
0345350047
-
Incremental cryptography and application to virus protection
-
M. Bellare, O. Goldreich, and S. Goldwasser, Incremental cryptography and application to virus protection, in Proc. 27th ACM Symp. Theory Comput., 1995, pp. 45-56.
-
(1995)
Proc. 27th ACM Symp. Theory Comput
, pp. 45-56
-
-
Bellare, M.1
Goldreich, O.2
Goldwasser, S.3
-
12
-
-
84958971416
-
Incremental unforgeable encryption
-
E. Buonanno, J. Katz, and M. Yung, Incremental unforgeable encryption, in Proc. 8th Int. Workshop Fast Softw. Encryption, 2002, pp. 109-124.
-
(2002)
Proc. 8th Int. Workshop Fast Softw. Encryption
, pp. 109-124
-
-
Buonanno, E.1
Katz, J.2
Yung, M.3
-
13
-
-
8644237883
-
Program result checking against adaptive programs and in cryptographic settings
-
M. Blum, M. Luby, and R. Rubinfeld, Program result checking against adaptive programs and in cryptographic settings, in Proc. DIMACS Workshop Distrib. Comput. Crypthography, 1991, pp. 107-118.
-
(1991)
Proc. DIMACS Workshop Distrib. Comput. Crypthography
, pp. 107-118
-
-
Blum, M.1
Luby, M.2
Rubinfeld, R.3
-
14
-
-
0000619172
-
Self-testing/correcting with applications to numerical problems
-
M. Blum, M. Luby, and R. Rubinfeld, Self-testing/correcting with applications to numerical problems, J. Comput. Syst. Sci., pp. 549-595, 1993.
-
(1993)
J. Comput. Syst. Sci.
, pp. 549-595
-
-
Blum, M.1
Luby, M.2
Rubinfeld, R.3
-
16
-
-
84865590663
-
Secure and efficient outsourcing of sequence comparisons
-
M. Blanton, M. J. Atallah, K. B. Frikken, and Q. Malluhi, Secure and efficient outsourcing of sequence comparisons, in Proc. 17th Eur. Symp. Res. Comput. Security, 2012, pp. 505-522.
-
(2012)
Proc. 17th Eur. Symp. Res. Comput. Security
, pp. 505-522
-
-
Blanton, M.1
Atallah, M.J.2
Frikken, K.B.3
Malluhi, Q.4
-
17
-
-
84946840347
-
Short signatures from the Weil pairings
-
D. Boneh, B. Lynn, and H. Shacham, Short signatures from the Weil pairings, in Proc. 7th Int. Conf. Theory Appl. Cryptol. Inf. Security: Adv. Cryptol., 2001, pp. 514-532.
-
(2001)
Proc. 7th Int. Conf. Theory Appl. Cryptol. Inf. Security: Adv. Cryptol
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
18
-
-
0003278940
-
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
-
M. Bellare and C. Namprempre, Authenticated encryption: Relations among notions and analysis of the generic composition paradigm, in Proc. 6th Int. Conf. Theory Appl. Cryptol. Inf. Security, 2000, pp. 531-545.
-
(2000)
Proc. 6th Int. Conf. Theory Appl. Cryptol. Inf. Security
, pp. 531-545
-
-
Bellare, M.1
Namprempre, C.2
-
19
-
-
80051977699
-
Verifiable delegation of computation over large datasets
-
S. Benabbas, R. Gennaro, and Y. Vahlis, Verifiable delegation of computation over large datasets, in Proc. 31st Annu. Conf. Adv. Cryptol., 2011, pp. 111-131.
-
(2011)
Proc. 31st Annu. Conf. Adv. Cryptol
, pp. 111-131
-
-
Benabbas, S.1
Gennaro, R.2
Vahlis, Y.3
-
20
-
-
79960720911
-
-
MIT Comput. Sci. Artif. Intell. Laboratory, Cambridge, MA, USA, Tech. Rep. MIT-CSAIL-TR-2011-005, Jan
-
R. A. Popa, N. Zeldovich, and H. Balakrishnan, CryptDB: A practical encrypted relational DBMS, MIT Comput. Sci. Artif. Intell. Laboratory, Cambridge, MA, USA, Tech. Rep. MIT-CSAIL-TR- 2011-005, Jan. 2011.
-
(2011)
CryptDB: A Practical Encrypted Relational DBMS
-
-
Popa, R.A.1
Zeldovich, N.2
Balakrishnan, H.3
-
21
-
-
78650755198
-
Secure delegation of elliptic-curve pairing
-
B. Chevallier-Mames, J. Coron, N. McCullagh, D. Naccache, and M. Scott, Secure delegation of elliptic-curve pairing, in Proc. 9th IFIP WG8.8/11.2 Int. Conf. Smart Card Re. Adv. Appl., 2010, pp. 24-35.
-
(2010)
Proc. 9th IFIP WG8.8/11.2 Int. Conf. Smart Card Re. Adv. Appl
, pp. 24-35
-
-
Chevallier-Mames, B.1
Coron, J.2
McCullagh, N.3
Naccache, D.4
Scott, M.5
-
23
-
-
38049146172
-
Batch verification of short signatures
-
J. Camenisch, S. Hohenberger, and M. Pedersen, Batch verification of short signatures, in Proc. 26th Annu. Int. Conf. Theory Appl. Cryptographic Techn., 2007, pp. 246-263.
-
(2007)
Proc. 26th Annu. Int. Conf. Theory Appl. Cryptographic Techn
, pp. 246-263
-
-
Camenisch, J.1
Hohenberger, S.2
Pedersen, M.3
-
24
-
-
67049119910
-
An accumulator based on bilinear maps and efficient revocation for anonymous credentials
-
J. Camenisch, M. Kohlweiss, and C. Soriente, An accumulator based on bilinear maps and efficient revocation for anonymous credentials, in Proc. 12th Int. Conf. Practice Theory Public Key Cryptography, 2009, pp. 481-500.
-
(2009)
Proc. 12th Int. Conf. Practice Theory Public Key Cryptography
, pp. 481-500
-
-
Camenisch, J.1
Kohlweiss, M.2
Soriente, C.3
-
26
-
-
80755169473
-
Practical delegation of computation using multiple servers
-
R. Canetti, B. Riva, G. Rothblum, Practical delegation of computation using multiple servers, in Proc. 18th ACM Conf. Comput. Commun. Security, 2011, pp. 445-454.
-
(2011)
Proc. 18th ACM Conf. Comput. Commun. Security
, pp. 445-454
-
-
Canetti, R.1
Riva, B.2
Rothblum, G.3
-
28
-
-
77955108861
-
Fair payments for outsourced computations
-
B. Carbunar, M. Tripunitara, Fair payments for outsourced computations, in Proc. Annu. Conf. Sensor, Mesh Ad Hoc Commun. Netw., 2010, pp. 529-537.
-
(2010)
Proc. Annu. Conf. Sensor, Mesh Ad Hoc Commun. Netw
, pp. 529-537
-
-
Carbunar, B.1
Tripunitara, M.2
-
29
-
-
84870282993
-
Efficient fair conditional payments for outsourcing computations
-
Dec
-
X. Chen, J. Li, and W. Susilo, Efficient fair conditional payments for outsourcing computations, IEEE Trans. Inf. Forensics Security, vol. 7, no. 6, pp. 1687-1694, Dec. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.6
, pp. 1687-1694
-
-
Chen, X.1
Li, J.2
Susilo, W.3
-
30
-
-
84865597567
-
New algorithms for secure outsourcing of modular exponentiations
-
X. Chen, J. Li, J. Ma, Q. Tang, and W. Lou, New algorithms for secure outsourcing of modular exponentiations, in Proc. Eur. Conf. Res. Comput. Security, 2012, pp. 541-556.
-
(2012)
Proc. Eur. Conf. Res. Comput. Security
, pp. 541-556
-
-
Chen, X.1
Li, J.2
Ma, J.3
Tang, Q.4
Lou, W.5
-
31
-
-
84987605467
-
Verifiable computation over large database with incremental updates
-
X. Chen, J. Li, J. Weng, J. Ma, and W. Lou, Verifiable computation over large database with incremental updates, in Proc. 19th Eur. Symp. Res. Comput. Security, 2012, pp. 148-162.
-
(2012)
Proc. 19th Eur. Symp. Res. Comput. Security
, pp. 148-162
-
-
Chen, X.1
Li, J.2
Weng, J.3
Ma, J.4
Lou, W.5
-
33
-
-
84879866739
-
Comparing the pairing efficiency over compositeorder and prime-order elliptic curves
-
A. Guillevic, Comparing the pairing efficiency over compositeorder and prime-order elliptic curves, in Proc. 11th Int. Conf. Appl. Cryptography Netw. Security, 2013, pp. 357-372.
-
(2013)
Proc. 11th Int. Conf. Appl. Cryptography Netw. Security
, pp. 357-372
-
-
Guillevic, A.1
-
34
-
-
57049095424
-
Delegating computation: Interactive proofs for muggles
-
S. Goldwasser, Y. T. Kalai, and G. N. Rothblum, Delegating computation: Interactive proofs for muggles, in Proc. ACM Symp. Theory Comput., 2008, pp. 113-122.
-
(2008)
Proc. ACM Symp. Theory Comput
, pp. 113-122
-
-
Goldwasser, S.1
Kalai, Y.T.2
Rothblum, G.N.3
-
35
-
-
0024611659
-
The knowledge complexity of interactive proof-systems
-
S. Goldwasser, S. Micali, and C. Rackoff, The knowledge complexity of interactive proof-systems, SIAM J. Comput., vol. 18, no. 1, pp. 186-208, 1989.
-
(1989)
SIAM J. Comput.
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
37
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
C. Gentry, Fully homomorphic encryption using ideal lattices, Proc. 41st Annu. ACM Symp. Theory Comput., 2009, pp. 169-178.
-
(2009)
Proc. 41st Annu. ACM Symp. Theory Comput
, pp. 169-178
-
-
Gentry, C.1
-
39
-
-
77957005936
-
Non-interactive verifiable computing: Outsourcing computation to untrusted workers
-
R. Gennaro, C. Gentry, and B. Parno, Non-interactive verifiable computing: Outsourcing computation to untrusted workers, in Proc. 30th Annu. Conf. Adv. Cryptol., 2010, pp. 465-482.
-
(2010)
Proc. 30th Annu. Conf. Adv. Cryptol
, pp. 465-482
-
-
Gennaro, R.1
Gentry, C.2
Parno, B.3
-
42
-
-
0026963441
-
A note on efficient zero-knowledge proofs and arguments
-
J. Kilian, A note on efficient zero-knowledge proofs and arguments, in Proc.ACMSymp. Theory Comput., 1992, pp. 723-732.
-
(1992)
Proc.ACMSymp. Theory Comput
, pp. 723-732
-
-
Kilian, J.1
-
43
-
-
84957654400
-
Improved efficient arguments (preliminary version)
-
J. Kilian, Improved efficient arguments (preliminary version), in Proc. 15th Annu. Int. Cryptol. Conf., 1995, pp. 311-324. 1995.
-
(1995)
Proc. 15th Annu. Int. Cryptol. Conf
, vol.1995
, pp. 311-324
-
-
Kilian, J.1
-
46
-
-
84860006920
-
Incremental deterministic public-key encryption
-
I. Mironov, O. Pandey, O. Reingold, and G. Segev, Incremental deterministic public-key encryption, in Proc. 31st Annu. Int. Conf. Theory Appl. Cryptographic Techn., 2012, pp. 628-644.
-
(2012)
Proc. 31st Annu. Int. Conf. Theory Appl. Cryptographic Techn
, pp. 628-644
-
-
Mironov, I.1
Pandey, O.2
Reingold, O.3
Segev, G.4
-
47
-
-
21044438930
-
A general model for authenticated data structures
-
C. U. Martel, G. Nuckolls, P. T. Devanbu, M. Gertz, A. Kwong, and S. G. Stubblebine, A general model for authenticated data structures, Algorithmica, vol. 39, no. 1, pp. 21-41, 2004.
-
(2004)
Algorithmica
, vol.39
, Issue.1
, pp. 21-41
-
-
Martel, C.U.1
Nuckolls, G.2
Devanbu, P.T.3
Gertz, M.4
Kwong, A.5
Stubblebine, S.G.6
-
49
-
-
33750245651
-
Accumulators frombilinear pairings and applications
-
L. Nguyen, Accumulators frombilinear pairings and applications, in Proc. Cryptographers Track RSA Conf., 2005, pp. 75-292.
-
(2005)
Proc. Cryptographers Track RSA Conf
, pp. 75-292
-
-
Nguyen, L.1
-
50
-
-
84858307151
-
How to delegate and verify in public: Verifiable computation from attribute-based encryption
-
B. Parno, M. Raykova and V. Vaikuntanathan, How to delegate and verify in public: Verifiable computation from attribute-based encryption, in Proc. 9th Theory of Cryptography Conf., 2012, pp. 422-439.
-
(2012)
Proc. 9th Theory of Cryptography Conf
, pp. 422-439
-
-
Parno, B.1
Raykova, M.2
Vaikuntanathan, V.3
-
51
-
-
38149124777
-
Time and space efficient algorithms for two-party authenticated data structures
-
C. Papamanthou and R. Tamassia, Time and space efficient algorithms for two-party authenticated data structures, in Proc. 9th Int. Conf. Inf. Commun. Security, 2007, pp. 1-15.
-
(2007)
Proc. 9th Int. Conf. Inf. Commun. Security
, pp. 1-15
-
-
Papamanthou, C.1
Tamassia, R.2
-
53
-
-
79960862322
-
Secure and practical outsourcing of linear programming in cloud computing
-
C. Wang, K. Ren, and J. Wang, Secure and practical outsourcing of linear programming in cloud computing, in Proc. 30th IEEE Int. Conf. Comput. Commun., 2011, pp. 820-828.
-
(2011)
Proc. 30th IEEE Int. Conf. Comput. Commun
, pp. 820-828
-
-
Wang, C.1
Ren, K.2
Wang, J.3
-
54
-
-
84877785052
-
Harnessing the cloud for securely outsourcing large-scale systems of linear equations
-
Jun
-
C. Wang, K. Ren, J. Wang, and Q. Wang, Harnessing the cloud for securely outsourcing large-scale systems of linear equations, IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 6, pp. 1172-1181, Jun. 2013.
-
(2013)
IEEE Trans. Parallel Distrib. Syst.
, vol.24
, Issue.6
, pp. 1172-1181
-
-
Wang, C.1
Ren, K.2
Wang, J.3
Wang, Q.4
|