Read moreOn the (Im)possibility of Obfuscating ProgramsBoaz Barak, Oded Goldreich, Rusell Impagliazzo, Steven Rudich, Amit Sahai, Salil Vadhan, & Ke Yang
Read moreComputer Systems Established, Maintained and Trusted by Mutually Suspicious Groups David L. Chaum
Read moreThe Knowledge Complexity of Interactive Proof-SystemsShafi Goldwasser, Silvio Micali, & Charles Rackoffero
Read moreMinimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial SecurityMatt Blaze, Whiteld Diffie, Ronald L. Rivest, Bruce Schneier, Tsutomu Shimomura, Eric Thompson, & Michael Wiener
Read moreCryptDB: Protecting Confidentiality with Encrypted Query ProcessingRaluca Ada Popa, Catherine M. S. Redfield, Nickolai Zeldovich, & Hari Balakrishnan
Read moreOn Data Banks and Privacy HomomorphismsRonald L. Rivest, Len Adleman, & Michael L. Dertouzos
Read morePolynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum ComputerPeter Shor
Read moreA Method for Obtaining Digital Signatures and Public Key CryptosystemsRonald L. Rivest, Adi Shamir, & Len Adleman