Secure multi-party computation (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Secure multi-party computation" in English language version.

refsWebsite
Global rank English rank
1,185th place
840th place
1st place
1st place
274th place
309th place
2nd place
2nd place
11th place
8th place
5,032nd place
3,357th place
low place
low place
low place
low place
1,045th place
746th place
652nd place
515th place
low place
low place
low place
low place
low place
low place
9,276th place
9,572nd place
low place
low place
low place
low place

acm.org

dl.acm.org

  • Oded Goldreich, Silvio Micali, Avi Wigderson:How to Play any Mental Game or A Completeness Theorem for Protocols with Honest Majority. STOC 1987: 218-229 [2]
  • Joe Kilian: Founding Cryptography on Oblivious Transfer. STOC 1988: 20-31 [5]
  • Tal Rabin, Michael Ben-Or: Verifiable Secret Sharing and Multiparty Protocols with Honest Majority (Extended Abstract). STOC 1989: 73-85 [6]
  • Danny Dolev, Cynthia Dwork, Orli Waarts, Moti Yung: Perfectly Secure Message Transmission. J. ACM 40(1): 17-47 (1993)[7]
  • Rafail Ostrovsky, Moti Yung: How to Withstand Mobile Virus Attacks. PODC 1991. pp. 51-59 [8]
  • Moti Yung: From Mental Poker to Core Business: Why and How to Deploy Secure Computation Protocols? ACM Conference on Computer and Communications Security 2015: 1-2 https://dl.acm.org/citation.cfm?doid=2810103.2812701

bipartisanpolicy.org

biu.ac.il

cyber.biu.ac.il

boston.gov

doi.org

ethereum.org

eips.ethereum.org

gcn.com

iacr.org

eprint.iacr.org

ieee.org

ieeexplore.ieee.org

  • Andrew Chi-Chih Yao:How to Generate and Exchange Secrets (Extended Abstract). FOCS 1986: 162-167 [1]

mp-spdz.readthedocs.io

palisade-crypto.org

securecomputation.org

  • Evans, David; Kolesnikov, Vladimir; Rosulek, Mike (2018). "A Pragmatic Introduction to Secure Multi-Party Computation" (PDF). securecomputation.org. Archived from the original (PDF) on 2024-08-12. Retrieved 19 October 2024.

semanticscholar.org

api.semanticscholar.org

springer.com

link.springer.com

  • Zvi Galil, Stuart Haber, Moti Yung: Cryptographic Computation: Secure Fault-Tolerant Protocols and the Public-Key Model. CRYPTO 1987: 135-155 [3]
  • David Chaum, Ivan Damgård, Jeroen van de Graaf: Multiparty Computations Ensuring Privacy of Each Party's Input and Correctness of the Result. 87-119 [4]
  • Michael Backes, Birgit Pfitzmann, and Michael Waidner. "A general composition theorem for secure reactive systems." In Theory of Cryptography Conference, pp. 336-354. Springer, Berlin, Heidelberg, 2004.

web.archive.org

  • Evans, David; Kolesnikov, Vladimir; Rosulek, Mike (2018). "A Pragmatic Introduction to Secure Multi-Party Computation" (PDF). securecomputation.org. Archived from the original (PDF) on 2024-08-12. Retrieved 19 October 2024.
  • Claudio Orlandi: Is multiparty computation any good in practice?, ICASSP 2011
  • "SCAPI: The Secure Computation API Library | BIU Cyber Center". Archived from the original on 2023-06-04. Retrieved 2022-09-29.

wisc.edu

cs.wisc.edu