Secure two-party computation

Results: 88



#Item
21Secure Two-Party Computation with  Reusable Bit-Commitments, via a Cut-andChoose with Forge-and-Lose Technique (Slide presentation)  Luís T. A. N. Brandão

Secure Two-Party Computation with Reusable Bit-Commitments, via a Cut-andChoose with Forge-and-Lose Technique (Slide presentation) Luís T. A. N. Brandão

Add to Reading List

Source URL: webpages.alunos.fc.ul.pt

Language: English - Date: 2014-01-12 23:32:56
    22Secure two-party computation, using a forge-and-lose technique (a very brief and simplified overview) Luís Brandão*

    Secure two-party computation, using a forge-and-lose technique (a very brief and simplified overview) Luís Brandão*

    Add to Reading List

    Source URL: webpages.alunos.fc.ul.pt

    Language: English - Date: 2014-01-15 20:55:04
      23GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits Thomas Schneider and Michael Zohner Engineering Cryptographic Protocols Group (ENCRYPTO), European Center for Security and Privacy by Design (EC

      GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits Thomas Schneider and Michael Zohner Engineering Cryptographic Protocols Group (ENCRYPTO), European Center for Security and Privacy by Design (EC

      Add to Reading List

      Source URL: fc13.ifca.ai

      Language: English - Date: 2013-03-27 20:42:00
        24Covert Two-Party Computation Carnegie Mellon University 5000 Forbes Ave Pittsburgh, PANicholas Hopper

        Covert Two-Party Computation Carnegie Mellon University 5000 Forbes Ave Pittsburgh, PANicholas Hopper

        Add to Reading List

        Source URL: hunch.net

        Language: English - Date: 2005-03-01 11:04:04
        25Secure two-party computation, using a forge-and-lose technique (a very brief and simplified overview) Luís Brandão*

        Secure two-party computation, using a forge-and-lose technique (a very brief and simplified overview) Luís Brandão*

        Add to Reading List

        Source URL: webpages.alunos.fc.ul.pt

        Language: English - Date: 2014-01-15 21:35:15
          26Secure Two-Party Computation over a Z-Channel Paolo Palmieri and Olivier Pereira Universit´e catholique de Louvain UCL Crypto Group, ICTEAM Institute Place du Levant 3, B-1348 Louvain-la-Neuve, Belgium

          Secure Two-Party Computation over a Z-Channel Paolo Palmieri and Olivier Pereira Universit´e catholique de Louvain UCL Crypto Group, ICTEAM Institute Place du Levant 3, B-1348 Louvain-la-Neuve, Belgium

          Add to Reading List

          Source URL: www.uclouvain.be

          Language: English - Date: 2012-11-06 12:33:24
            27Secure Two-Party Computation  Faster Secure TwoTwo-Party Computation Using Garbled Circuits  Bob’s Genome: ACTG…

            Secure Two-Party Computation Faster Secure TwoTwo-Party Computation Using Garbled Circuits Bob’s Genome: ACTG…

            Add to Reading List

            Source URL: mightbeevil.com

            Language: English - Date: 2011-08-12 18:46:27
              28Efficient Set Intersection with Simulation-Based Security Michael J. Freedman∗ Carmit Hazay†  Kobbi Nissim‡

              Efficient Set Intersection with Simulation-Based Security Michael J. Freedman∗ Carmit Hazay† Kobbi Nissim‡

              Add to Reading List

              Source URL: www.eng.biu.ac.il

              Language: English - Date: 2014-09-04 05:09:56
              29A New Approach to Practical Active-Secure Two-Party Computation 1 1

              A New Approach to Practical Active-Secure Two-Party Computation 1 1

              Add to Reading List

              Source URL: eprint.iacr.org

              Language: English - Date: 2012-02-14 09:50:59
              30An extended abstract of this paper was published in the proceedings of PKCAutomata Evaluation and Text Search Protocols with Simulation Based Security Rosario Gennaro∗

              An extended abstract of this paper was published in the proceedings of PKCAutomata Evaluation and Text Search Protocols with Simulation Based Security Rosario Gennaro∗

              Add to Reading List

              Source URL: www.eng.biu.ac.il

              Language: English - Date: 2014-07-21 08:57:56