Secure multi-party computation

Results: 221



#Item
21Forecasting Run-Times of Secure Two-Party Computation Axel Schr¨opfer Florian Kerschbaum

Forecasting Run-Times of Secure Two-Party Computation Axel Schr¨opfer Florian Kerschbaum

Add to Reading List

Source URL: www.fkerschbaum.org

Language: English - Date: 2011-09-10 05:30:51
22Privacy-Preserving Computation (Position Paper) Florian Kerschbaum SAP Research Karlsruhe, Germany

Privacy-Preserving Computation (Position Paper) Florian Kerschbaum SAP Research Karlsruhe, Germany

Add to Reading List

Source URL: www.fkerschbaum.org

Language: English - Date: 2012-12-10 10:27:09
23page bidon...  MULTIPARTY UNCONDITIONALLY SECURE PROTOCOLS (Extended Abstract)

page bidon... MULTIPARTY UNCONDITIONALLY SECURE PROTOCOLS (Extended Abstract)

Add to Reading List

Source URL: www.chaum.com

Language: English - Date: 2015-05-26 20:05:16
24ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

Add to Reading List

Source URL: www.crypto.ethz.ch

Language: English - Date: 2015-04-27 13:05:10
25MPC vs. SFE : Unconditional and Computational Security? Martin Hirt, Ueli Maurer, and Vassilis Zikas Department of Computer Science, ETH Zurich, 8092 Zurich, Switzerland {hirt,maurer,vzikas}@inf.ethz.ch

MPC vs. SFE : Unconditional and Computational Security? Martin Hirt, Ueli Maurer, and Vassilis Zikas Department of Computer Science, ETH Zurich, 8092 Zurich, Switzerland {hirt,maurer,vzikas}@inf.ethz.ch

Add to Reading List

Source URL: www.cs.rpi.edu

Language: English - Date: 2011-02-19 14:29:40
26ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-06-03 07:39:24
27Rational Secret Sharing, Revisited [Extended Abstract] ∗ S. Dov Gordon

Rational Secret Sharing, Revisited [Extended Abstract] ∗ S. Dov Gordon

Add to Reading List

Source URL: netecon.seas.harvard.edu

Language: English - Date: 2009-12-16 17:13:11
28The proceedings version of this paper appears in CCSThis is the full paper, an earlier version of which was circulated under the title “Garbling Schemes”. Foundations of Garbled Circuits Mihir Bellare1 1

The proceedings version of this paper appears in CCSThis is the full paper, an earlier version of which was circulated under the title “Garbling Schemes”. Foundations of Garbled Circuits Mihir Bellare1 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-06-30 14:22:04
29LNCSPractical Private Information Aggregation in Large Networks

LNCSPractical Private Information Aggregation in Large Networks

Add to Reading List

Source URL: www.nada.kth.se

Language: English - Date: 2012-05-30 08:54:47
30Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values Benjamin Mood Yale University

Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values Benjamin Mood Yale University

Add to Reading List

Source URL: www.cs.yale.edu

Language: English - Date: 2014-08-25 10:31:08