On-Line/Off-Line Leakage Resilient Secure Computation Protocols
暂无分享,去创建一个
[1] Ran Canetti,et al. Resettable zero-knowledge (extended abstract) , 2000, STOC '00.
[2] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[3] Silvio Micali,et al. Physically Observable Cryptography (Extended Abstract) , 2004, Theory of Cryptography Conference.
[4] Ivan Damgård,et al. Leakage Resilient Secure Two-Party Computation , 2011, IACR Cryptol. ePrint Arch..
[5] Yael Tauman Kalai,et al. One-Time Programs , 2008, CRYPTO.
[6] Silvio Micali,et al. Physically Observable Cryptography (Extended Abstract) , 2004, TCC.
[7] Guy N. Rothblum,et al. Leakage-Resilient Signatures , 2010, TCC.
[8] Martijn Stam. Beyond Uniformity: Better Security/Efficiency Tradeoffs for Compression Functions , 2008, CRYPTO.
[9] Craig Gentry,et al. Toward Basing Fully Homomorphic Encryption on Worst-Case Hardness , 2010, CRYPTO.
[10] Yehuda Lindell,et al. A Proof of Yao's Protocol for Secure Two-Party Computation , 2004, Electron. Colloquium Comput. Complex..
[11] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[12] Henri Gilbert,et al. Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings , 2010, EUROCRYPT.
[13] Joe Kilian,et al. Improved Efficient Arguments (Preliminary Version) , 1995, CRYPTO.
[14] Avi Wigderson,et al. Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation (Extended Abstract) , 1988, STOC.
[15] Nir Bitansky,et al. Leakage-Tolerant Interactive Protocols , 2012, TCC.
[16] Amit Sahai,et al. Leakage-Resilient Zero Knowledge , 2011, CRYPTO.
[17] Tal Rabin. Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings , 2010, CRYPTO.
[18] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[19] Shai Halevi. Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings , 2009, CRYPTO.
[20] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[21] Moni Naor,et al. Public-Key Cryptosystems Resilient to Key Leakage , 2009, SIAM J. Comput..
[22] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[23] Oded Goldreich,et al. Foundations of Cryptography: Volume 1, Basic Tools , 2001 .
[24] Craig Gentry,et al. Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.
[25] Elisabeth Oswald,et al. A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework , 2011, CRYPTO.
[26] Stefan Dziembowski,et al. Leakage-Resilient Cryptography , 2008, 2008 49th Annual IEEE Symposium on Foundations of Computer Science.