-
2
-
-
84945134014
-
Priced oblivious transfer: How to sell digital goods
-
B. Aiello, Y. Ishai, and O. Reingold. Priced oblivious transfer: How to sell digital goods. In Proceedings of Eurocrypt '01, LNCS, Volume 2045, 2001.
-
(2001)
Proceedings of Eurocrypt '01, LNCS
, vol.2045
-
-
Aiello, B.1
Ishai, Y.2
Reingold, O.3
-
6
-
-
85032877753
-
Non-interactive oblivious transfer and applications
-
M. Bellare and S. Micali. Non-interactive oblivious transfer and applications. In Proceedings of Crypto 89, pages 547-557, 1990.
-
(1990)
Proceedings of Crypto 89
, pp. 547-557
-
-
Bellare, M.1
Micali, S.2
-
10
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
R. Canetti. Universally composable security: A new paradigm for cryptographic protocols. In Proceedings of FOCS, 2001.
-
(2001)
Proceedings of FOCS
-
-
Canetti, R.1
-
11
-
-
0034782679
-
Selective private function evaluation with applications to private statistics
-
R. Canetti, Y. Ishai, R. Kumar, M. Reiter, R. Rubinfeld, and R. Wright. Selective private function evaluation with applications to private statistics. In Proceedings of Twentieth ACM Symposium on Principles of Distributed Computing (PODC), 2001.
-
(2001)
Proceedings of Twentieth ACM Symposium on Principles of Distributed Computing (PODC)
-
-
Canetti, R.1
Ishai, Y.2
Kumar, R.3
Reiter, M.4
Rubinfeld, R.5
Wright, R.6
-
13
-
-
0029541045
-
Private information retrieval
-
B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan. Private information retrieval. In Proceedings of the 36th FOCS, pages 41-50, 1995.
-
(1995)
Proceedings of the 36th FOCS
, pp. 41-50
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
14
-
-
0003935622
-
-
Kluwer Academic Publisher, Norwell, MA
-
D. R. Coelho. The VHDL Handbook. Kluwer Academic Publisher, Norwell, MA, 1989.
-
(1989)
The VHDL Handbook
-
-
Coelho, D.R.1
-
15
-
-
0026243790
-
Efficiently computing static single assignment form and the control dependence graph
-
R. Cytron, J. Ferrante, B. K. Rosen, M.N. Wegman, and F. K. Zadeck. Efficiently computing static single assignment form and the control dependence graph. ACM Transactions on Programming Languages and Systems, 13(4):451-490, 1991.
-
(1991)
ACM Transactions on Programming Languages and Systems
, vol.13
, Issue.4
, pp. 451-490
-
-
Cytron, R.1
Ferrante, J.2
Rosen, B.K.3
Wegman, M.N.4
Zadeck, F.K.5
-
18
-
-
0029483209
-
The transmogrifier c hardware description language and compiler for FPGAS
-
D. A. Buell and K. L. Pocek, editors April
-
D. Galloway. The transmogrifier c hardware description language and compiler for fpgas. In D. A. Buell and K. L. Pocek, editors, Proceedings of IEEE Workshop on FPGAs for Custom Computing Machines, pages 136-144, April 1995.
-
(1995)
Proceedings of IEEE Workshop on FPGAs for Custom Computing Machines
, pp. 136-144
-
-
Galloway, D.1
-
22
-
-
0030149547
-
Software protection and simulation on oblivious RAMs
-
O. Goldreich and R. Ostrovsky. Software protection and simulation on oblivious RAMs. Journal of the ACM, 43(3):431-473, 1996.
-
(1996)
Journal of the ACM
, vol.43
, Issue.3
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
24
-
-
24144457853
-
Extending oblivious transfers efficiently
-
LNCS 2729 Springer-Verlag
-
Y. Ishai, J. Kilian, K. Nissim, and E. Petrank. Extending oblivious transfers efficiently. In Proceedings of Crypto '03, LNCS 2729, pages 145-161. Springer-Verlag, 2003.
-
(2003)
Proceedings of Crypto '03
, pp. 145-161
-
-
Ishai, Y.1
Kilian, J.2
Nissim, K.3
Petrank, E.4
-
26
-
-
33746437508
-
Privacy preserving data mining
-
Y. Lindell and B. Pinkas. Privacy preserving data mining. Journal of Cryptology, 15(3):177-206, 2003.
-
(2003)
Journal of Cryptology
, vol.15
, Issue.3
, pp. 177-206
-
-
Lindell, Y.1
Pinkas, B.2
-
32
-
-
0002760854
-
Algorithms for selfish agents - Mechanism design for distributed computation
-
N. Nisan. Algorithms for selfish agents - mechanism design for distributed computation. In STACS, 1999.
-
(1999)
STACS
-
-
Nisan, N.1
-
33
-
-
0030414049
-
Scheduling and partitioning ansi-c programs onto multifpga ccm architectures
-
J. Arnold and K. L. Pocek, editors April
-
J. B. Peterson, R. B. O'Connor, and P. M. Athanas. Scheduling and partitioning ansi-c programs onto multifpga ccm architectures. In J. Arnold and K. L. Pocek, editors, Proceedings of IEEE Workshop on FPGAs for Custom Computing Machines, pages 178-187, April 1996.
-
(1996)
Proceedings of IEEE Workshop on FPGAs for Custom Computing Machines
, pp. 178-187
-
-
Peterson, J.B.1
O'Connor, R.B.2
Athanas, P.M.3
-
34
-
-
35248883427
-
Fair secure two-party computation
-
LNCS 2656 Springer-Verlag
-
B. Pinkas. Fair secure two-party computation. In Proceedings of Eurocrypt '03, LNCS 2656, pages 87-105. Springer-Verlag, 2003.
-
(2003)
Proceedings of Eurocrypt '03
, pp. 87-105
-
-
Pinkas, B.1
-
35
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public key cryptosystems. Communication of the ACM, (21):120-126, 1978.
-
(1978)
Communication of the ACM
, Issue.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
36
-
-
18744402597
-
AGVI - Automatic generation, verification, and implementation of security protocols
-
D. Song, A. Perrig, and D. Phan. AGVI - automatic generation, verification, and implementation of security protocols. In 13th Conference on Computer Aided Verification (CAV), 2001.
-
(2001)
13th Conference on Computer Aided Verification (CAV)
-
-
Song, D.1
Perrig, A.2
Phan, D.3
-
38
-
-
0030414050
-
Sop: A reconfigurable massively parallel system and its controldata-flow based compiling method
-
J. Arnold and K. L. Pocek, editors April
-
T. Yamauchi, S. Nakaya, and N. Kajihara. Sop: A reconfigurable massively parallel system and its controldata-flow based compiling method. In J. Arnold and K. L. Pocek, editors, Proceedings of IEEE Workshop on FPGAs for Custom Computing Machines, pages 148-156, April 1996.
-
(1996)
Proceedings of IEEE Workshop on FPGAs for Custom Computing Machines
, pp. 148-156
-
-
Yamauchi, T.1
Nakaya, S.2
Kajihara, N.3
-
40
-
-
0037974191
-
Untrusted hosts and confidentiality: Secure program partitioning
-
S. Zdancewic, L. Zheng, N. Nystrom, and A. C. Myers. Untrusted hosts and confidentiality: Secure program partitioning. ACM Transactions on Computer Systems, 20(3):283-328, 2002.
-
(2002)
ACM Transactions on Computer Systems
, vol.20
, Issue.3
, pp. 283-328
-
-
Zdancewic, S.1
Zheng, L.2
Nystrom, N.3
Myers, A.C.4
|