Donald Beaver

Orcid: 0000-0003-3728-6674

According to our database1, Donald Beaver authored at least 38 papers between 1989 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
STROBE: Streaming Threshold Random Beacons.
Proceedings of the 5th Conference on Advances in Financial Technologies, 2023

2021
STROBE: Stake-based Threshold Random Beacons.
IACR Cryptol. ePrint Arch., 2021

Software Integrity and Validation Using Cryptographic Composability and Computer Vision.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021

2020
Applied Awareness: Test-Driven GUI Development using Computer Vision and Cryptography.
CoRR, 2020

2013
On the Isolation of a Common Secret.
Proceedings of the Mathematics of Paul Erdős II, 2013

2002
Network Security and Storage Security: Symmetries and Symmetry-Breaking.
Proceedings of the First International IEEE Security in Storage Workshop, 2002

On Deniability in Quantum Key Exchange.
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002

2000
Minimal-Latency Secure Function Evaluation.
Proceedings of the Advances in Cryptology, 2000

1998
Server-Assisted Cryptography.
Proceedings of the 1998 Workshop on New Security Paradigms, 1998

Quorum-Based Secure Multi-party Computation.
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998

One-Time Tables for Two-Party Computation.
Proceedings of the Computing and Combinatorics, 4th Annual International Conference, 1998

Adaptively Secure Oblivious Transfer.
Proceedings of the Advances in Cryptology, 1998

1997
Locally Random Reductions: Improvements and Applications.
J. Cryptol., 1997

Commodity-Based Cryptography (Extended Abstract).
Proceedings of the Twenty-Ninth Annual ACM Symposium on the Theory of Computing, 1997

Plug and Play Encryption.
Proceedings of the Advances in Cryptology, 1997

1996
Adaptive Zero Knowledge and Computational Equivocation (Extended Abstract).
Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, 1996

Correlated Pseudorandomness and the Complexity of Private Computations.
Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, 1996

Equivocable Oblivious Transfer.
Proceedings of the Advances in Cryptology, 1996

1995
Computing with DNA.
J. Comput. Biol., 1995

A universal molecular computer.
Proceedings of the DNA Based Computers, 1995

Precomputing Oblivious Transfer.
Proceedings of the Advances in Cryptology, 1995

1994
Factoring: The DNA Solution.
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994

1993
Global, Unpredictable Bit Generation Without Broadcast.
Proceedings of the Advances in Cryptology, 1993

1992
Cryptographic Protocols Provably Secure Against Dynamic Adversaries.
Proceedings of the Advances in Cryptology, 1992

How to Break a "Secure" Oblivious Transfer Protocol.
Proceedings of the Advances in Cryptology, 1992

1991
Secure Multiparty Protocols and Zero-Knowledge Proof Systems Tolerating a Faulty Minority.
J. Cryptol., 1991

Efficient Multiparty Protocols Using Circuit Randomization.
Proceedings of the Advances in Cryptology, 1991

Foundations of Secure Interactive Computing.
Proceedings of the Advances in Cryptology, 1991

1990
The Round Complexity of Secure Protocols (Extended Abstract)
Proceedings of the 22nd Annual ACM Symposium on Theory of Computing, 1990

Hiding Instances in Multioracle Queries.
Proceedings of the STACS 90, 1990

Hiding Instances in Zero-Knowledge Proof Systems (Extended Abstract).
Proceedings of the Advances in Cryptology, 1990

Security with Low Communication Overhead.
Proceedings of the Advances in Cryptology, 1990

1989
Non-Cryptographic Fault-Tolerant Computing in Constant Number of Rounds of Interaction.
Proceedings of the Eighth Annual ACM Symposium on Principles of Distributed Computing, 1989

Multiparty Computation with Faulty Majority (Extended Announcement)
Proceedings of the 30th Annual Symposium on Foundations of Computer Science, Research Triangle Park, North Carolina, USA, 30 October, 1989

Perfect Privacy For Two-Party Protocols.
Proceedings of the Distributed Computing And Cryptography, 1989

Formal Definitions for Secure Distributed Protocols.
Proceedings of the Distributed Computing And Cryptography, 1989

Multiparty Computation with Faulty Majority.
Proceedings of the Advances in Cryptology, 1989

Multiparty Protocols Tolerating Half Faulty Processors.
Proceedings of the Advances in Cryptology, 1989


  Loading...