-
2
-
-
85180536036
-
-
Online at
-
Intel and Ethernet. Online at http://www.intel.com/standards/case/case ethernet.htm.
-
Intel and Ethernet
-
-
-
3
-
-
85180535272
-
-
Intel Corporation. Online at
-
Intel Corporation. Online at http://www.intel.com.
-
-
-
-
4
-
-
85180538315
-
-
Online at
-
Introduction to DSL. Online at http://www.informit.com/articles/article.asp?p= 31699&seqNum=3&rl=1.
-
Introduction to DSL
-
-
-
5
-
-
85180536345
-
-
Motorola. Online at
-
Motorola. Online at http://www.motorola.com.
-
-
-
-
7
-
-
84862323270
-
-
Online at
-
RSA Factoring Challenge. Online at www.rsasecurity.com/rsalabs/challenges/ factoring/.
-
RSA Factoring Challenge
-
-
-
8
-
-
85180540240
-
-
RSA Labs. Online at
-
RSA Labs. Online at http://www.rsasecurity.com/rsalabs.
-
-
-
-
9
-
-
33847249399
-
-
Online at
-
TWIRL and RSA Key Size. Online at http://www.rsasecurity.com/rsalabs/node. asp?id=2004.
-
TWIRL and RSA Key Size
-
-
-
11
-
-
85180527379
-
-
Summer Online at 1995
-
RSA CryptoBytes, Summer 1995. Online at ftp://ftp.rsasecurity.com/pub/cryptobytes/ crypto1n2.pdf, 1995.
-
(1995)
RSA CryptoBytes
-
-
-
15
-
-
85011102358
-
-
Online at
-
IBM Cryptographic Hardware. Online at http://www-03.ibm.com/security/products/, 2006.
-
(2006)
IBM Cryptographic Hardware
-
-
-
20
-
-
84974593790
-
Reducing the servers computation in private information retrieval: PIR with pre-processing
-
A. Beimel, Y. Ishai, and T. Malkin. Reducing the servers computation in private information retrieval: PIR with pre-processing. Lecture Notes in Computer Science, 1880:55–?, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1880
, pp. 55
-
-
Beimel, A.1
Ishai, Y.2
Malkin, T.3
-
24
-
-
1642602228
-
Private Information Retrieval with Polylogarithmic Communication
-
Springer-Verlag
-
C. Cachin, S. Micali, and M. Stadler. Private Information Retrieval with Polylogarithmic Communication. In Proceedings of Eurocrypt, pages 402–414. Springer-Verlag, 1999.
-
(1999)
Proceedings of Eurocrypt
, pp. 402-414
-
-
Cachin, C.1
Micali, S.2
Stadler, M.3
-
27
-
-
0029541045
-
Private information retrieval
-
B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan. Private information retrieval. In IEEE Symposium on Foundations of Computer Science, pages 41–50, 1995.
-
(1995)
IEEE Symposium on Foundations of Computer Science
, pp. 41-50
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
28
-
-
0032201622
-
Private information retrieval
-
B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan. Private information retrieval. J. ACM, 45(6):965–981, 1998.
-
(1998)
J. ACM
, vol.45
, Issue.6
, pp. 965-981
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
35
-
-
84937574654
-
A random server model for private information retrieval or how to achieve information theoretic PIR avoiding database replication
-
Y. Gertner, S. Goldwasser, and T. Malkin. A random server model for private information retrieval or how to achieve information theoretic PIR avoiding database replication. Lecture Notes in Computer Science, 1518:200–?, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1518
, pp. 200
-
-
Gertner, Y.1
Goldwasser, S.2
Malkin, T.3
-
36
-
-
0031624875
-
Protecting data privacy in private information retrieval schemes
-
New York, NY, USA, ACM Press
-
Y. Gertner, Y. Ishai, E. Kushilevitz, and T. Malkin. Protecting data privacy in private information retrieval schemes. In STOC’98: Proceedings of the thirtieth annual ACM symposium on Theory of computing, pages 151–160, New York, NY, USA, 1998. ACM Press.
-
(1998)
STOC’98: Proceedings of the thirtieth annual ACM symposium on Theory of computing
, pp. 151-160
-
-
Gertner, Y.1
Ishai, Y.2
Kushilevitz, E.3
Malkin, T.4
-
38
-
-
85180530546
-
-
Hothardware.com. Online at
-
Hothardware.com. Pentium 4 670 3.8GHz Performance Profile. Online at http://www.hothardware.com/viewarticle.aspx?articleid=686.
-
Pentium 4 670 3.8GHz Performance Profile
-
-
-
39
-
-
17444392883
-
Protecting client privacy with trusted computing at the server
-
A. Iliev and S. W. Smith. Protecting client privacy with trusted computing at the server. IEEE Security and Privacy, 3(2):20–28, 2005.
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.2
, pp. 20-28
-
-
Iliev, A.1
Smith, S. W.2
-
41
-
-
85180538036
-
-
Intel. Online at May
-
Intel. Intel Multi-Core Processing. Online at http://www.intel.com/cd/ids/developer/asmo-na/eng/strategy/multicore/index.htm, May 2006.
-
(2006)
Intel Multi-Core Processing
-
-
-
42
-
-
34247630324
-
-
Intel Circuit Research Labs. Online at
-
Intel Circuit Research Labs. Gigascale Integration-Challenges and Opportunities. Online at http://www.intel.com/cd/ids/developer/ asmo-na/eng/182440.htm.
-
Gigascale Integration-Challenges and Opportunities
-
-
-
43
-
-
84876648716
-
-
Intel Corporation. Online at
-
Intel Corporation. Intel Pentium 4 Processor. Online at http://www.intel.com/products/processor/ pentium4.
-
Intel Pentium 4 Processor
-
-
-
44
-
-
4544231738
-
Batch codes and their applications
-
Y. Ishai, E. Kushilevitz, R. Ostrovsky, and A. Sahai. Batch codes and their applications. In STOC’04: Proceedings of the thirty-sixth annual ACM symposium on Theory of com puting, pages 262–271, 2004.
-
(2004)
STOC’04: Proceedings of the thirty-sixth annual ACM symposium on Theory of com puting
, pp. 262-271
-
-
Ishai, Y.1
Kushilevitz, E.2
Ostrovsky, R.3
Sahai, A.4
-
46
-
-
0031378815
-
Replication is not needed: single database, computationally-private information retrieval
-
IEEE Computer Society
-
E. Kushilevitz and R. Ostrovsky. Replication is not needed: single database, computationally-private information retrieval. In Proceedings of FOCS. IEEE Computer Society, 1997.
-
(1997)
Proceedings of FOCS
-
-
Kushilevitz, E.1
Ostrovsky, R.2
-
47
-
-
23044519068
-
One-way trapdoor permutations are sufficient for non-trivial single-server private information retrieval
-
E. Kushilevitz and R. Ostrovsky. One-way trapdoor permutations are sufficient for non-trivial single-server private information retrieval. In Proceedings of EUROCRYPT, 2000.
-
(2000)
Proceedings of EUROCRYPT
-
-
Kushilevitz, E.1
Ostrovsky, R.2
-
49
-
-
26444579536
-
An oblivious transfer protocol with log-squared communication
-
H. Lipmaa. An oblivious transfer protocol with log-squared communication. Cryptology ePrint Archive, 2004.
-
(2004)
Cryptology ePrint Archive
-
-
Lipmaa, H.1
-
53
-
-
85180540795
-
-
MobilityGuru.com. Online at
-
MobilityGuru.com. The First Pentium-M Notebook Put To The Test. Online at http://www.mobilityguru.com/2003/02/05/the first pentium/page10. html.
-
The First Pentium-M Notebook Put To The Test
-
-
-
54
-
-
84966243285
-
Modular Multiplication without Trial Division
-
P. Montgomery. Modular Multiplication without Trial Division. Mathematics of Computation, 44(170):519–521, 1985.
-
(1985)
Mathematics of Computation
, vol.44
, Issue.170
, pp. 519-521
-
-
Montgomery, P.1
-
55
-
-
0000793139
-
Cramming more components onto integrated circuits
-
April
-
G. Moore. Cramming more components onto integrated circuits. Electronics Magazine, April 1965.
-
(1965)
Electronics Magazine
-
-
Moore, G.1
-
56
-
-
0032669864
-
Oblivious transfer and polynomial evaluation
-
New York, NY, USA, ACM Press
-
M. Naor and B. Pinkas. Oblivious transfer and polynomial evaluation. In STOC’99: Proceedings of the thirty-first annual ACM symposium on Theory of computing, pages 245–254, New York, NY, USA, 1999. ACM Press.
-
(1999)
STOC’99: Proceedings of the thirty-first annual ACM symposium on Theory of computing
, pp. 245-254
-
-
Naor, M.1
Pinkas, B.2
-
58
-
-
85180540124
-
-
N. I. of Standards and T. (NIST). Online at Aug
-
N. I. of Standards and T. (NIST). The key management guideline. Online at http://csrc.nist.gov/CryptoToolkit/tkkeymgmt.html, Aug. 2005.
-
(2005)
The key management guideline
-
-
-
59
-
-
0000277371
-
Public-key cryptosystems based on composite degree residuosity classes
-
P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Proceedings of EuroCrypt, 1999.
-
(1999)
Proceedings of EuroCrypt
-
-
Paillier, P.1
-
66
-
-
20444451186
-
New lattice based cryptographic constructions
-
O. Regev. New lattice based cryptographic constructions. Journal of the ACM, 51(6):899–942, 2004.
-
(2004)
Journal of the ACM
, vol.51
, Issue.6
, pp. 899-942
-
-
Regev, O.1
-
68
-
-
85008047433
-
Exposing the Mythical MIPS Year
-
R. D. Silverman. Exposing the Mythical MIPS Year. Computer, 32(8):22–26, 1999.
-
(1999)
Computer
, vol.32
, Issue.8
, pp. 22-26
-
-
Silverman, R. D.1
-
69
-
-
0034809926
-
Practical server privacy with secure coprocessors
-
S. W. Smith and D. Safford. Practical server privacy with secure coprocessors. IBM Systems Journal, 40(3):683–695, 2001.
-
(2001)
IBM Systems Journal
, vol.40
, Issue.3
, pp. 683-695
-
-
Smith, S. W.1
Safford, D.2
-
71
-
-
84947772655
-
A new and efficient all-or-nothing disclosure of secrets protocol
-
J. Stern. A new and efficient all-or-nothing disclosure of secrets protocol. In Proceedings of Asia Crypt, pages 357–371, 1998.
-
(1998)
Proceedings of Asia Crypt
, pp. 357-371
-
-
Stern, J.1
|