Secure and private sequence comparisons, Proceeding of the ACM workshop on Privacy in the electronic society , WPES '03, pp.39-44, 2003. ,
DOI : 10.1145/1005140.1005147
Towards Practical Privacy for Genomic Computation, 2008 IEEE Symposium on Security and Privacy (sp 2008), pp.216-230, 2008. ,
DOI : 10.1109/SP.2008.34
Privacy preserving error resilient dna searching through oblivious automata, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.519-528, 2007. ,
DOI : 10.1145/1315245.1315309
Practical Private DNA String Searching and Matching through Efficient Oblivious Automata Evaluation, In: DBSec, vol.45, issue.6, pp.81-94, 2009. ,
DOI : 10.1007/3-540-48910-X_16
Privacy-preserving matching of DNA profiles, ePrint Cryptology Archive Report, vol.203, 2008. ,
Privacy-preserving genomic computation through program specialization, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.338-347, 2009. ,
DOI : 10.1145/1653662.1653703
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.158.1425
Secure outsourcing of sequence comparisons, In: PET, pp.63-78, 2004. ,
Secure outsourcing of sequence comparisons, International Journal of Information Security, vol.23, issue.4, pp.277-287, 2005. ,
DOI : 10.1007/s10207-005-0070-3
Secure Outsourcing of DNA Searching via Finite Automata, 2010. ,
DOI : 10.1007/978-3-642-13739-6_4
URL : https://hal.archives-ouvertes.fr/hal-01056669
Toward a practical data privacy scheme for a distributed implementation of the Smith-Waterman genome sequence comparison algorithm, In: NDSS, 2006. ,
A Cryptographic Approach to Securely Share and Query Genomic Sequences, IEEE Transactions on Information Technology in Biomedicine, vol.12, issue.5, pp.606-617, 2008. ,
DOI : 10.1109/TITB.2007.908465
Mohassel: Communication-efficient private protocols for longest common subsequence, In: RSA, pp.265-278, 2009. ,
Longest common subsequence as private search, Proceedings of the 8th ACM workshop on Privacy in the electronic society, WPES '09, pp.81-90, 2009. ,
DOI : 10.1145/1655188.1655200
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.174.6388
Efficient oblivious transfer protocols, In: SODA, pp.448-457, 2001. ,
An Oblivious Transfer Protocol with Log-Squared Communication, In: Information Security. LNCS, vol.3650, pp.314-328, 2005. ,
DOI : 10.1007/11556992_23
Single-Database Private Information Retrieval with Constant Communication Rate, In: ICALP, pp.803-815, 2005. ,
DOI : 10.1007/11523468_65
Oblivious transfer and polynomial evaluation, Proceedings of the thirty-first annual ACM symposium on Theory of computing , STOC '99, 1999. ,
DOI : 10.1145/301250.301312
Single Database Private Information Retrieval Implies Oblivious Transfer, In: Advances in Cryptology ? EUROCRYPT, pp.122-138, 2000. ,
DOI : 10.1007/3-540-45539-6_10
Computationally private information retrieval with poly-logarithmic communication, In: EUROCRYPT, pp.402-414, 1999. ,
Replication is not needed: single database, computationally-private information retrieval, Proceedings 38th Annual Symposium on Foundations of Computer Science, pp.364-373, 1997. ,
DOI : 10.1109/SFCS.1997.646125
Single-Database Private Information Retrieval Schemes??: Overview, Performance Study, and Usage with Statistical Databases, In: Privacy in Statistical Databases, pp.257-265, 2006. ,
DOI : 10.1007/11930242_22
A lattice-based computationally-efficient private information retrieval protocol, In: WEWORC, 2007. ,
A length-flexible threshold cryptosystem with applications, Australasian Conference on Information Security and Privacy, 2007. ,
Design and analysis for log-squared and log private information retrieval, 2008. ,
High-Speed Private Information Retrieval Computation on GPU, 2008 Second International Conference on Emerging Security Information, Systems and Technologies, 2008. ,
DOI : 10.1109/SECURWARE.2008.55
URL : https://hal.archives-ouvertes.fr/hal-00335223
How to play ANY mental game, Proceedings of the nineteenth annual ACM conference on Theory of computing , STOC '87, pp.218-229, 1987. ,
DOI : 10.1145/28395.28420
Security and Composition of Multiparty Cryptographic Protocols, Journal of Cryptology, vol.13, issue.1, pp.143-202, 2000. ,
DOI : 10.1007/s001459910006