Follow
Donald Beaver
Donald Beaver
Independent Scholar
Verified email at post.harvard.edu - Homepage
Title
Cited by
Cited by
Year
The round complexity of secure protocols
D Beaver, S Micali, P Rogaway
Proceedings of the twenty-second annual ACM symposium on Theory of computing …, 1990
9051990
Efficient multiparty protocols using circuit randomization
D Beaver
Advances in Cryptology—CRYPTO’91: Proceedings 11, 420-432, 1992
7711992
Dapper, a large-scale distributed systems tracing infrastructure
BH Sigelman, LA Barroso, M Burrows, P Stephenson, M Plakal, D Beaver, ...
6972010
Non-cryptographic fault-tolerant computing in constant number of rounds of interaction
J Bar-Ilan, D Beaver
Proceedings of the eighth annual ACM Symposium on Principles of distributed …, 1989
3681989
Foundations of Secure Interactive Computing.
D Beaver
Crypto 91, 377-391, 1991
3661991
Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority
D Beaver
Journal of Cryptology 4, 75-122, 1991
3111991
Hiding instances in multioracle queries
D Beaver, J Feigenbaum
STACS 90: 7th Annual Symposium on Theoretical Aspects of Computer Science …, 1990
3081990
Precomputing oblivious transfer
D Beaver
Advances in Cryptology—CRYPT0’95: 15th Annual International Cryptology …, 2001
2702001
Correlated pseudorandomness and the complexity of private computations
D Beaver
Proceedings of the twenty-eighth annual ACM symposium on Theory of computing …, 1996
2431996
Multiparty computation with faulty majority
D Beaver, S Goldwasser
Advances in Cryptology—CRYPTO’89 Proceedings 9, 589-590, 1990
1871990
Commodity-based cryptography
D Beaver
Proceedings of the twenty-ninth annual ACM symposium on Theory of computing …, 1997
1851997
Cryptographic protocols provably secure against dynamic adversaries
D Beaver, S Haber
Advances in Cryptology—EUROCRYPT’92: Workshop on the Theory and Application …, 1993
1701993
Security with low communication overhead
D Beaver, J Feigenbaum, J Kilian, P Rogaway
Proc. of CRYPTO 90, 62-76, 1991
1221991
Multiparty protocols tolerating half faulty processors
D Beaver
Advances in Cryptology—CRYPTO’89 Proceedings 9, 560-572, 1990
1181990
A universal molecular computer
D Beaver
Penn State Univ. Tech. Report CSE-95-001, 1995
1051995
Perfect privacy for two-party protocols
D Beaver
Proceedings of DIMACS Workshop on Distributed Computing and Cryptography 2 …, 1991
991991
Locally Random Reductions: Improvements and Applications.
D Beaver, J Feigenbaum, J Kilian, P Rogaway
Journal of Cryptology 10 (1), 1997
851997
Computing with DNA
D Beaver
Journal of Computational Biology 2 (1), 1-7, 1995
781995
Plug and play encryption
D Beaver
Advances in Cryptology—CRYPTO'97: 17th Annual International Cryptology …, 2006
742006
Minimal-latency secure function evaluation
D Beaver
Advances in Cryptology—EUROCRYPT 2000: International Conference on the …, 2000
722000
The system can't perform the operation now. Try again later.
Articles 1–20