Cryptographers' World
 

Donald Beaver



19 papers in database with 1088 citations StarStar

H-number: 15

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Donald Beaver,  Joan Feigenbaum,  Joe Kilian,  Phillip Rogaway,  Locally Random Reductions: Improvements and Applications, Journal of Cryptology, Volume 10(1), pp. 17 - 36, Springer, 1997.

[Cited 40 times ]

2. Donald Beaver,  Secure Multiparty Protocols and Zero-Knowledge Proof Systems Tolerating a Faulty Minority, Journal of Cryptology, Volume 4(2), pp. 75 - 122, Springer, 1991.

[Cited 206 times Red StarRed Star]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Donald Beaver,  On Deniability in Quantum Key Exchange, pp. 352 - 367, EUROCRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 1 times ]

2. Donald Beaver,  Minimal-Latency Secure Function Evaluation, pp. 335 - 350, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 41 times ]

3. Donald Beaver,  Adaptively Secure Oblivious Transfer, pp. 300 - 314, ASIACRYPT 1998.

[Electronic Edition][Cited 8 times ]

4. Donald Beaver,  Avishai Wool,  Quorum-Based Secure Multi-party Computation, pp. 375 - 390, EUROCRYPT 1998.

[Electronic Edition][Cited 24 times ]

5. Donald Beaver,  Plug and Play Encryption, pp. 75 - 89, CRYPTO 1997.

[Electronic Edition][Cited 30 times ]

6. Donald Beaver,  Equivocable Oblivious Transfer, pp. 119 - 130, EUROCRYPT 1996.

[Electronic Edition][Cited 6 times ]

7. Donald Beaver,  Precomputing Oblivious Transfer, pp. 97 - 109, CRYPTO 1995.

[Electronic Edition][Cited 41 times ]

8. Donald Beaver,  Factoring: The DNA Solution, pp. 419 - 423, ASIACRYPT 1994.

[Electronic Edition][Cited 22 times ]

9. Donald Beaver,  Nicol So,  Global, Unpredictable Bit Generation Without Broadcast, pp. 424 - 434, EUROCRYPT 1993.

[Electronic Edition][Cited 15 times ]

10. Donald Beaver,  How to Break a "Secure" Oblivious Transfer Protocol, pp. 285 - 296, EUROCRYPT 1992.

[Electronic Edition][Cited 18 times ]

11. Donald Beaver,  Stuart Haber,  Cryptographic Protocols Provably Secure Against Dynamic Adversaries, pp. 307 - 323, EUROCRYPT 1992.

[Electronic Edition][Cited 91 times Red Star]

12. Donald Beaver,  Efficient Multiparty Protocols Using Circuit Randomization, pp. 420 - 432, CRYPTO 1991.

[Electronic Edition][Cited 58 times Red Star]

13. Donald Beaver,  Foundations of Secure Interactive Computing, pp. 377 - 391, CRYPTO 1991.

[Electronic Edition][Cited 213 times Red StarRed Star]

14. Donald Beaver,  Joan Feigenbaum,  Joe Kilian,  Phillip Rogaway,  Security with Low Communication Overhead, pp. 62 - 76, CRYPTO 1990.

[Electronic Edition][Cited 89 times Red Star]

15. Donald Beaver,  Joan Feigenbaum,  Victor Shoup,  Hiding Instances in Zero-Knowledge Proof Systems (Extended Abstract), pp. 326 - 338, CRYPTO 1990.

[Electronic Edition][Cited 24 times ]

16. Donald Beaver,  Shafi Goldwasser,  Multiparty Computation with Faulty Majority, pp. 589 - 590, CRYPTO 1989.

[Electronic Edition][Cited 96 times Red Star]

17. Donald Beaver,  Multiparty Protocols Tolerating Half Faulty Processors, pp. 560 - 572, CRYPTO 1989.

[Electronic Edition][Cited 65 times Red Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...