메뉴 건너뛰기




Volumn , Issue , 2004, Pages

Fairplay - A secure two-party computation system

Author keywords

[No Author keywords available]

Indexed keywords

PETROLEUM RESERVOIR EVALUATION; PROGRAM COMPILERS;

EID: 85084163840     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (655)

References (40)
  • 6
    • 85032877753 scopus 로고
    • Non-interactive oblivious transfer and applications
    • M. Bellare and S. Micali. Non-interactive oblivious transfer and applications. In Proceedings of Crypto 89, pages 547-557, 1990.
    • (1990) Proceedings of Crypto 89 , pp. 547-557
    • Bellare, M.1    Micali, S.2
  • 10
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • R. Canetti. Universally composable security: A new paradigm for cryptographic protocols. In Proceedings of FOCS, 2001.
    • (2001) Proceedings of FOCS
    • Canetti, R.1
  • 14
    • 0003935622 scopus 로고
    • Kluwer Academic Publisher, Norwell, MA
    • D. R. Coelho. The VHDL Handbook. Kluwer Academic Publisher, Norwell, MA, 1989.
    • (1989) The VHDL Handbook
    • Coelho, D.R.1
  • 18
    • 0029483209 scopus 로고
    • The transmogrifier c hardware description language and compiler for FPGAS
    • D. A. Buell and K. L. Pocek, editors April
    • D. Galloway. The transmogrifier c hardware description language and compiler for fpgas. In D. A. Buell and K. L. Pocek, editors, Proceedings of IEEE Workshop on FPGAs for Custom Computing Machines, pages 136-144, April 1995.
    • (1995) Proceedings of IEEE Workshop on FPGAs for Custom Computing Machines , pp. 136-144
    • Galloway, D.1
  • 22
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious RAMs
    • O. Goldreich and R. Ostrovsky. Software protection and simulation on oblivious RAMs. Journal of the ACM, 43(3):431-473, 1996.
    • (1996) Journal of the ACM , vol.43 , Issue.3 , pp. 431-473
    • Goldreich, O.1    Ostrovsky, R.2
  • 24
    • 24144457853 scopus 로고    scopus 로고
    • Extending oblivious transfers efficiently
    • LNCS 2729 Springer-Verlag
    • Y. Ishai, J. Kilian, K. Nissim, and E. Petrank. Extending oblivious transfers efficiently. In Proceedings of Crypto '03, LNCS 2729, pages 145-161. Springer-Verlag, 2003.
    • (2003) Proceedings of Crypto '03 , pp. 145-161
    • Ishai, Y.1    Kilian, J.2    Nissim, K.3    Petrank, E.4
  • 26
    • 33746437508 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • Y. Lindell and B. Pinkas. Privacy preserving data mining. Journal of Cryptology, 15(3):177-206, 2003.
    • (2003) Journal of Cryptology , vol.15 , Issue.3 , pp. 177-206
    • Lindell, Y.1    Pinkas, B.2
  • 32
    • 0002760854 scopus 로고    scopus 로고
    • Algorithms for selfish agents - Mechanism design for distributed computation
    • N. Nisan. Algorithms for selfish agents - mechanism design for distributed computation. In STACS, 1999.
    • (1999) STACS
    • Nisan, N.1
  • 34
    • 35248883427 scopus 로고    scopus 로고
    • Fair secure two-party computation
    • LNCS 2656 Springer-Verlag
    • B. Pinkas. Fair secure two-party computation. In Proceedings of Eurocrypt '03, LNCS 2656, pages 87-105. Springer-Verlag, 2003.
    • (2003) Proceedings of Eurocrypt '03 , pp. 87-105
    • Pinkas, B.1
  • 35
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public key cryptosystems. Communication of the ACM, (21):120-126, 1978.
    • (1978) Communication of the ACM , Issue.21 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 38
    • 0030414050 scopus 로고    scopus 로고
    • Sop: A reconfigurable massively parallel system and its controldata-flow based compiling method
    • J. Arnold and K. L. Pocek, editors April
    • T. Yamauchi, S. Nakaya, and N. Kajihara. Sop: A reconfigurable massively parallel system and its controldata-flow based compiling method. In J. Arnold and K. L. Pocek, editors, Proceedings of IEEE Workshop on FPGAs for Custom Computing Machines, pages 148-156, April 1996.
    • (1996) Proceedings of IEEE Workshop on FPGAs for Custom Computing Machines , pp. 148-156
    • Yamauchi, T.1    Nakaya, S.2    Kajihara, N.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.