![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Donald Beaver
Person information
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c32]Donald Beaver, Konstantinos Chalkias, Mahimna Kelkar, Lefteris Kokoris-Kogias, Kevin Lewi, Ladi de Naurois, Valeria Nikolaenko, Arnab Roy, Alberto Sonnino:
STROBE: Streaming Threshold Random Beacons. AFT 2023: 7:1-7:16 - 2021
- [c31]Donald Beaver
:
Software Integrity and Validation Using Cryptographic Composability and Computer Vision. CSCML 2021: 405-413 - [i2]Donald Beaver, Konstantinos Chalkias, Mahimna Kelkar, Lefteris Kokoris-Kogias, Kevin Lewi, Ladi de Naurois, Valeria Nicolaenko, Arnab Roy, Alberto Sonnino:
STROBE: Stake-based Threshold Random Beacons. IACR Cryptol. ePrint Arch. 2021: 1643 (2021) - 2020
- [i1]Donald Beaver:
Applied Awareness: Test-Driven GUI Development using Computer Vision and Cryptography. CoRR abs/2006.03725 (2020)
2010 – 2019
- 2013
- [p1]Donald Beaver, Stuart Haber, Peter Winkler
:
On the Isolation of a Common Secret. The Mathematics of Paul Erdős II 2013: 21-38
2000 – 2009
- 2002
- [c30]Donald Beaver:
On Deniability in Quantum Key Exchange. EUROCRYPT 2002: 352-367 - [c29]Donald Beaver:
Network Security and Storage Security: Symmetries and Symmetry-Breaking. IEEE Security in Storage Workshop 2002: 3-9 - 2000
- [c28]Donald Beaver:
Minimal-Latency Secure Function Evaluation. EUROCRYPT 2000: 335-350
1990 – 1999
- 1998
- [c27]Donald Beaver:
Adaptively Secure Oblivious Transfer. ASIACRYPT 1998: 300-314 - [c26]Donald Beaver:
One-Time Tables for Two-Party Computation. COCOON 1998: 361-370 - [c25]Donald Beaver, Avishai Wool
:
Quorum-Based Secure Multi-party Computation. EUROCRYPT 1998: 375-390 - [c24]Donald Beaver:
Server-Assisted Cryptography. Workshop on New Security Paradigms 1998: 92-106 - 1997
- [j3]Donald Beaver, Joan Feigenbaum, Joe Kilian, Phillip Rogaway:
Locally Random Reductions: Improvements and Applications. J. Cryptol. 10(1): 17-36 (1997) - [c23]Donald Beaver:
Plug and Play Encryption. CRYPTO 1997: 75-89 - [c22]Donald Beaver:
Commodity-Based Cryptography (Extended Abstract). STOC 1997: 446-455 - 1996
- [c21]Donald Beaver:
Equivocable Oblivious Transfer. EUROCRYPT 1996: 119-130 - [c20]Donald Beaver:
Correlated Pseudorandomness and the Complexity of Private Computations. STOC 1996: 479-488 - [c19]Donald Beaver:
Adaptive Zero Knowledge and Computational Equivocation (Extended Abstract). STOC 1996: 629-638 - 1995
- [j2]Donald Beaver:
Computing with DNA. J. Comput. Biol. 2(1): 1-7 (1995) - [c18]Donald Beaver:
Precomputing Oblivious Transfer. CRYPTO 1995: 97-109 - [c17]Donald Beaver:
A universal molecular computer. DNA Based Computers 1995: 29-36 - 1994
- [c16]Donald Beaver:
Factoring: The DNA Solution. ASIACRYPT 1994: 419-423 - 1993
- [c15]Donald Beaver, Nicol So:
Global, Unpredictable Bit Generation Without Broadcast. EUROCRYPT 1993: 424-434 - 1992
- [c14]Donald Beaver:
How to Break a "Secure" Oblivious Transfer Protocol. EUROCRYPT 1992: 285-296 - [c13]Donald Beaver, Stuart Haber:
Cryptographic Protocols Provably Secure Against Dynamic Adversaries. EUROCRYPT 1992: 307-323 - 1991
- [j1]Donald Beaver:
Secure Multiparty Protocols and Zero-Knowledge Proof Systems Tolerating a Faulty Minority. J. Cryptol. 4(2): 75-122 (1991) - [c12]Donald Beaver:
Foundations of Secure Interactive Computing. CRYPTO 1991: 377-391 - [c11]Donald Beaver:
Efficient Multiparty Protocols Using Circuit Randomization. CRYPTO 1991: 420-432 - 1990
- [c10]Donald Beaver, Joan Feigenbaum, Joe Kilian, Phillip Rogaway:
Security with Low Communication Overhead. CRYPTO 1990: 62-76 - [c9]Donald Beaver, Joan Feigenbaum, Victor Shoup:
Hiding Instances in Zero-Knowledge Proof Systems (Extended Abstract). CRYPTO 1990: 326-338 - [c8]Donald Beaver, Joan Feigenbaum:
Hiding Instances in Multioracle Queries. STACS 1990: 37-48 - [c7]Donald Beaver, Silvio Micali, Phillip Rogaway:
The Round Complexity of Secure Protocols (Extended Abstract). STOC 1990: 503-513
1980 – 1989
- 1989
- [c6]Donald Beaver:
Multiparty Protocols Tolerating Half Faulty Processors. CRYPTO 1989: 560-572 - [c5]Donald Beaver, Shafi Goldwasser:
Multiparty Computation with Faulty Majority. CRYPTO 1989: 589-590 - [c4]Donald Beaver:
Formal Definitions for Secure Distributed Protocols. Distributed Computing And Cryptography 1989: 47-64 - [c3]Donald Beaver:
Perfect Privacy For Two-Party Protocols. Distributed Computing And Cryptography 1989: 65-78 - [c2]Donald Beaver, Shafi Goldwasser:
Multiparty Computation with Faulty Majority (Extended Announcement). FOCS 1989: 468-473 - [c1]Judit Bar-Ilan, Donald Beaver:
Non-Cryptographic Fault-Tolerant Computing in Constant Number of Rounds of Interaction. PODC 1989: 201-209
Coauthor Index
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:19 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint