SIA: Secure information aggregation in sensor networks B Przydatek, D Song, A Perrig Proceedings of the 1st international conference on Embedded networked sensor …, 2003 | 1127 | 2003 |
Efficient secure multi-party computation M Hirt, U Maurer, B Przydatek International conference on the theory and application of cryptology and …, 2000 | 168 | 2000 |
SIA: Secure information aggregation in sensor networks H Chan, A Perrig, B Przydatek, D Song Journal of Computer Security 15 (1), 69-102, 2007 | 126 | 2007 |
Cryptographic asynchronous multi-party computation with optimal resilience M Hirt, JB Nielsen, B Przydatek Annual International Conference on the Theory and Applications of …, 2005 | 62 | 2005 |
Robuster combiners for oblivious transfer R Meier, B Przydatek, J Wullschleger Theory of Cryptography Conference, 404-418, 2007 | 50 | 2007 |
Asynchronous multi-party computation with quadratic communication M Hirt, JB Nielsen, B Przydatek International Colloquium on Automata, Languages, and Programming, 473-485, 2008 | 42 | 2008 |
On robust combiners for private information retrieval and other primitives R Meier, B Przydatek Annual International Cryptology Conference, 555-569, 2006 | 40 | 2006 |
Solving medium-density subset sum problems in expected polynomial time AD Flaxman, B Przydatek Annual Symposium on Theoretical Aspects of Computer Science, 305-314, 2005 | 38 | 2005 |
A fast approximation algorithm for the subset‐sum problem B Przydatek International Transactions in Operational Research 9 (4), 437-459, 2002 | 18 | 2002 |
Error-tolerant combiners for oblivious primitives B Przydatek, J Wullschleger International Colloquium on Automata, Languages, and Programming, 461-472, 2008 | 16 | 2008 |
Separating sources for encryption and secret sharing Y Dodis, K Pietrzak, B Przydatek Theory of Cryptography Conference, 601-616, 2006 | 11 | 2006 |
On the (im) possibility of a text-only captcha B Przydatek First Workshop on Human Interactive Proofs, 2002 | 11 | 2002 |
Group message authentication B Przydatek, D Wikström International Conference on Security and Cryptography for Networks, 399-417, 2010 | 5 | 2010 |
Asynchronous proactive cryptosystems without agreement B Przydatek, R Strobl International Conference on the Theory and Application of Cryptology and …, 2004 | 4 | 2004 |
SIA B Przydatek, D Song, A Perrig Proceedings of the first international conference on Embedded networked …, 2003 | 2 | 2003 |
An Asynchronous Multi-Party Computation Protocol M Hirt, J Nielsen, B Przydatek Submission, 2004 | 1 | 2004 |
Approaches to Efficient and Robust Cryptographic Protocols B Przydatek ETH Zurich, 2007 | | 2007 |
Robust Combiners for Cryptographic Primitives C Sommer, B Przydatek | | |
Player Elimination: How to make Cheating Harmless in Multi-Party Computation M Hirt, U Maurer, B Przydatek | | |
Informationssicherheit und Kryptographie Das Random-Oracle Modell U Maurer, B Przydatek, J Sjodin | | |