<--- Back to Details
First PageDocument Content
Secure multi-party computation / Standard model / Homomorphic encryption / Pseudorandom generator / Cryptographic primitive / Commitment scheme / Information-theoretic security / Goldwasser–Micali cryptosystem / Secret sharing / Cryptography / Cryptographic protocols / Electronic commerce
Date: 2015-04-14 07:10:50
Secure multi-party computation
Standard model
Homomorphic encryption
Pseudorandom generator
Cryptographic primitive
Commitment scheme
Information-theoretic security
Goldwasser–Micali cryptosystem
Secret sharing
Cryptography
Cryptographic protocols
Electronic commerce

Arithmetic Cryptography∗ Benny Applebaum† Jonathan Avron∗ Christina Brzuska‡

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 933,16 KB

Share Document on Facebook

Similar Documents

Computer architecture / Instruction set architectures / Computing / Reduced instruction set computing / RISC-V / Cryptography / Cryptographic primitive / Instruction set / Institute for Applied Information Processing and Communications

Efficient Cryptography on RISC-V Advisor(s): Thomas Unterluggauer Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

DocID: 1qz0g - View Document

Cryptography / Public-key cryptography / Signcryption / Cryptographic primitive / Ciphertext indistinguishability / Key

Functional Signcryption: Notion, Construction, and Applications by Pratish Datta joint work with

DocID: 1qeWc - View Document

Cryptography / Applied mathematics / Symmetric-key algorithm / Advanced Encryption Standard / Block cipher / Encryption / Cipher / Cryptographic primitive / Data Encryption Standard / Index of cryptography articles / Outline of cryptography

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

DocID: 1q9PC - View Document

Cryptography / Cryptography standards / Pseudorandom number generators / Key management / FIPS 140-2 / Random number generation / Dual EC DRBG / Key / Cryptographic primitive / Entropy / Cryptographic Module Validation Program / Block cipher

Joshua Erin Hill Résumé The machine does not isolate man from the great problems of nature but plunges him more deeply into them. – Antoine de Saint-Exupéry

DocID: 1pTjt - View Document

Cryptography / Public-key cryptography / E-commerce / Cryptographic protocols / Internet Standards / Computer security / DolevYao model / Cryptographic primitive / Digital signature / Communications protocol / BurrowsAbadiNeedham logic / XTR

Abstracting Cryptographic Protocols with Tree Automata ? David Monniaux http://www.di.ens.fr/%7Fmonniaux, ´ Laboratoire d’Informatique, Ecole

DocID: 1mhYJ - View Document