Distributing the power of a government to enhance the privacy of voters
PODC '86 Proceedings of the fifth annual ACM symposium on Principles of distributed computing
Cryptographic capsules: a disjunctive primitive for interactive protocols
Proceedings on Advances in cryptology---CRYPTO '86
Minimum disclosure proofs of knowledge
Journal of Computer and System Sciences - 27th IEEE Conference on Foundations of Computer Science October 27-29, 1986
A key distribution system equivalent to factoring
Journal of Cryptology
General public key residue cryptosystems and mental poker protocols
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
An efficient identification scheme based on permuted kernels (extended abstract)
CRYPTO '89 Proceedings on Advances in cryptology
A new identification scheme based on syndrome decoding
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Batch exponentiation: a fast DLP-based signature generation strategy
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Foundations of Cryptography: Basic Tools
Foundations of Cryptography: Basic Tools
Cryptography and data security
Cryptography and data security
Designing Identification Schemes with Keys of Short Size
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Robustness Principles for Public Key Protocols
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
A Proposed Architecture for Trusted Third Party Services
Proceedings of the International Conference on Cryptography: Policy and Algorithms
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
Verifiable secret-ballot elections
Verifiable secret-ballot elections
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
On the difficulty of software key escrow
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Securing traceability of ciphertexts: towards a secure software key escrow system
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
A new identification scheme based on the perceptrons problem
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Efficient private bidding and auctions with an oblivious third party
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Efficient verifiable encryption (and fair exchange) of digital signatures
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Reducing the round complexity of a sealed-bid auction protocol with an off-line TTP
Proceedings of the 7th ACM conference on Computer and communications security
Practical multi-candidate election system
Proceedings of the twentieth annual ACM symposium on Principles of distributed computing
Paillier's cryptosystem revisited
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
REACT: Rapid Enhanced-Security Asymmetric Cryptosystem Transform
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
CT-RSA '02 Proceedings of the The Cryptographer's Track at the RSA Conference on Topics in Cryptology
Extended Notions of Security for Multicast Public Key Cryptosystems
ICALP '00 Proceedings of the 27th International Colloquium on Automata, Languages and Programming
Generation of Shared RSA Keys by Two Parties
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Trapdooring Discrete Logarithms on Elliptic Curves over Rings
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Sharing Decryption in the Context of Voting or Lotteries
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Decision Oracles are Equivalent to Matching Oracles
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Semantically Secure McEliece Public-Key Cryptosystems-Conversions for McEliece PKC
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
One Round Threshold Discrete-Log Key Generation without Private Channels
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Secure Multi-party Computational Geometry
WADS '01 Proceedings of the 7th International Workshop on Algorithms and Data Structures
Identification, Signature and Signcryption Using High Order Residues Modulo an RSA Composite
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Non-Interactive CryptoComputing For NC1
FOCS '99 Proceedings of the 40th Annual Symposium on Foundations of Computer Science
Privacy-preserving k-means clustering over vertically partitioned data
Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining
Verifiable encryption of digital signatures and applications
ACM Transactions on Information and System Security (TISSEC)
Secure and private sequence comparisons
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
Private collaborative forecasting and benchmarking
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
A secure distributed framework for achieving k-anonymity
The VLDB Journal — The International Journal on Very Large Data Bases
Cramer-Damgård signatures revisited: Efficient flat-tree signatures based on factoring
Theoretical Computer Science
A survey of homomorphic encryption for nonspecialists
EURASIP Journal on Information Security
Privacy-preserving link discovery
Proceedings of the 2008 ACM symposium on Applied computing
A new efficient privacy-preserving scalar product protocol
AusDM '07 Proceedings of the sixth Australasian conference on Data mining and analytics - Volume 70
Privacy-preserving Naïve Bayes classification
The VLDB Journal — The International Journal on Very Large Data Bases
Protection and retrieval of encrypted multimedia content: when cryptography meets signal processing
EURASIP Journal on Information Security
Secure Construction of Contingency Tables from Distributed Data
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
Public-Key Locally-Decodable Codes
CRYPTO 2008 Proceedings of the 28th Annual conference on Cryptology: Advances in Cryptology
Two Generic Constructions of Probabilistic Cryptosystems and Their Applications
SCN '08 Proceedings of the 6th international conference on Security and Cryptography for Networks
Privacy-preserving linear programming
Proceedings of the 2009 ACM symposium on Applied Computing
On the practical importance of communication complexity for secure multi-party computation protocols
Proceedings of the 2009 ACM symposium on Applied Computing
Fully homomorphic encryption using ideal lattices
Proceedings of the forty-first annual ACM symposium on Theory of computing
Secure two-party point-circle inclusion problem
Journal of Computer Science and Technology
Providing predictions on distributed HMMs with privacy
Artificial Intelligence Review
Privacy-preserving indexing of documents on the network
The VLDB Journal — The International Journal on Very Large Data Bases
A verifiable, centralized, coercion-free reputation system
Proceedings of the 8th ACM workshop on Privacy in the electronic society
Privacy-preserving computation of benchmarks on item-level data using RFID
Proceedings of the third ACM conference on Wireless network security
New public key cryptosystems based on the dependent-RSA problems
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Secure linear algebra using linearly recurrent sequences
TCC'07 Proceedings of the 4th conference on Theory of cryptography
Cryptocomputing with rationals
FC'02 Proceedings of the 6th international conference on Financial cryptography
Proceedings of the 2010 ACM Symposium on Applied Computing
Privacy-preserving trust verification
Proceedings of the 15th ACM symposium on Access control models and technologies
Collusion-resistant privacy-preserving data mining
Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining
Fair exchange of valuable information: A generalised framework
Journal of Computer and System Sciences
k-out-of-n oblivious transfer based on homomorphic encryption and solvability of linear equations
Proceedings of the first ACM conference on Data and application security and privacy
Benaloh's dense probabilistic encryption revisited
AFRICACRYPT'11 Proceedings of the 4th international conference on Progress in cryptology in Africa
Privacy preserving group linkage
SSDBM'11 Proceedings of the 23rd international conference on Scientific and statistical database management
A weakness in some oblivious transfer and zero-knowledge protocols
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
Filtering for private collaborative benchmarking
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
Paillier's cryptosystem modulo p2q and its applications to trapdoor commitment schemes
Mycrypt'05 Proceedings of the 1st international conference on Progress in Cryptology in Malaysia
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
Privacy preserving DBSCAN for vertically partitioned data
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
Hidden pairings and trapdoor DDH groups
ANTS'06 Proceedings of the 7th international conference on Algorithmic Number Theory
Cramer-Damgård signatures revisited: efficient flat-tree signatures based on factoring
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
Secure outsourcing of sequence comparisons
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
Cryptography in subgroups of Zn
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
Fair offline payment using verifiable encryption
WISA'04 Proceedings of the 5th international conference on Information Security Applications
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Location privacy for cellular systems; analysis and solution
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
On homomorphic encryption and chosen-ciphertext security
PKC'12 Proceedings of the 15th international conference on Practice and Theory in Public Key Cryptography
Privacy preserving monitoring and surveillance in sensor networks
ISPA'07 Proceedings of the 2007 international conference on Frontiers of High Performance Computing and Networking
One-more extension of paillier inversion problem and concurrent secure identification
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Homomorphic encryption for multiplications and pairing evaluation
SCN'12 Proceedings of the 8th international conference on Security and Cryptography for Networks
Group homomorphic encryption: characterizations, impossibility results, and applications
Designs, Codes and Cryptography
An information-flow type-system for mixed protocol secure computation
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Hi-index | 0.00 |