Faster Secure Two-Party Computation Using Garbled Circuits
暂无分享,去创建一个
Jonathan Katz | Yan Huang | David Evans | Lior Malka | Jonathan Katz | David Evans | Yan Huang | Lior Malka
[1] M S Waterman,et al. Identification of common molecular subsequences. , 1981, Journal of molecular biology.
[2] Oded Goldreich,et al. A randomized protocol for signing contracts , 1985, CACM.
[3] A. Yao. How to generate and exchange secrets , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[4] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[5] S. Henikoff,et al. Amino acid substitution matrices from protein blocks. , 1992, Proceedings of the National Academy of Sciences of the United States of America.
[6] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[7] Ralph Johnson,et al. Design patterns: elements of reuseable object-oriented software , 1994 .
[8] Oded Goldreich,et al. The Foundations of Cryptography - Volume 2: Basic Applications , 2001 .
[9] Elisabeth Oswald,et al. An ASIC Implementation of the AES SBoxes , 2002, CT-RSA.
[10] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[11] Yuval Ishai,et al. Extending Oblivious Transfers Efficiently , 2003, CRYPTO.
[12] Benny Pinkas,et al. Fairplay - Secure Two-Party Computation System , 2004, USENIX Security Symposium.
[13] Oded Goldreich,et al. Foundations of Cryptography: Volume 2, Basic Applications , 2004 .
[14] Moni Naor,et al. Computationally Secure Oblivious Transfer , 2004, Journal of Cryptology.
[15] Richard Mott. Smith–Waterman Algorithm , 2005 .
[16] Michael O. Rabin,et al. How To Exchange Secrets with Oblivious Transfer , 2005, IACR Cryptol. ePrint Arch..
[17] Doug Szajda,et al. Toward a Practical Data Privacy Scheme for a Distributed Implementation of the Smith-Waterman Genome Sequence Comparison Algorithm , 2006, NDSS.
[18] Yuval Ishai,et al. OT-Combiners via Secure Computation , 2008, TCC.
[19] Vladimir Kolesnikov,et al. Improved Garbled Circuit: Free XOR Gates and Applications , 2008, ICALP.
[20] Claudio Orlandi,et al. LEGO for Two-Party Secure Computation , 2009, TCC.
[21] Vitaly Shmatikov,et al. Towards Practical Privacy for Genomic Computation , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[22] Yehuda Lindell,et al. Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries , 2008, SCN.
[23] Stefan Katzenbeisser,et al. Privacy-Preserving Face Recognition , 2009, Privacy Enhancing Technologies.
[24] Yehuda Lindell,et al. Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries , 2007, Journal of Cryptology.
[25] Ahmad-Reza Sadeghi,et al. Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima , 2009, IACR Cryptol. ePrint Arch..
[26] Ahmad-Reza Sadeghi,et al. Efficient Privacy-Preserving Face Recognition , 2009, ICISC.
[27] Benny Pinkas,et al. Secure Two-Party Computation is Practical , 2009, IACR Cryptol. ePrint Arch..
[28] Benny Pinkas,et al. Secure Hamming Distance Based Computation and Its Applications , 2009, ACNS.
[29] Yehuda Lindell,et al. Efficient Secure Two-Party Protocols: Techniques and Constructions , 2010 .
[30] Yehuda Lindell,et al. Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer , 2010, IACR Cryptol. ePrint Arch..
[31] Benny Pinkas,et al. SCiFI - A System for Secure Face Identification , 2010, 2010 IEEE Symposium on Security and Privacy.
[32] Ahmad-Reza Sadeghi,et al. TASTY: tool for automating secure two-party computations , 2010, CCS '10.
[33] Jonathan Katz,et al. Efficient Privacy-Preserving Biometric Identification , 2011, NDSS.
[34] Abhi Shelat,et al. Two-Output Secure Computation with Malicious Adversaries , 2011, EUROCRYPT.