Secure two-party computation

Results: 88



#Item
1Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation

Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation

Add to Reading List

Source URL: acmccs.github.io

Language: English - Date: 2017-12-30 21:51:58
    2Round-Optimal Secure Two-Party Computation from Trapdoor Permutations Michele Ciampi DIEM Università di Salerno ITALY

    Round-Optimal Secure Two-Party Computation from Trapdoor Permutations Michele Ciampi DIEM Università di Salerno ITALY

    Add to Reading List

    Source URL: web.cs.ucla.edu

    Language: English - Date: 2018-05-09 14:03:00
      3LEGO for Two Party Secure Computation Jesper Buus Nielsen and Claudio Orlandi BRICS, Department of Computer Science, Aarhus Universitet, ˚ Abogade 34, 8200 ˚ Arhus, Denmark

      LEGO for Two Party Secure Computation Jesper Buus Nielsen and Claudio Orlandi BRICS, Department of Computer Science, Aarhus Universitet, ˚ Abogade 34, 8200 ˚ Arhus, Denmark

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2008-10-03 03:53:01
        4An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries∗ Yehuda Lindell† Benny Pinkas‡

        An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries∗ Yehuda Lindell† Benny Pinkas‡

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2008-01-30 02:51:31
          5Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer∗ Yehuda Lindell† Benny Pinkas‡

          Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer∗ Yehuda Lindell† Benny Pinkas‡

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2014-10-29 04:46:48
            6Systematizing Secure Computation for Research and Decision Support Jason Perry1 , Debayan Gupta2 , Joan Feigenbaum2 and Rebecca N. Wright1 1

            Systematizing Secure Computation for Research and Decision Support Jason Perry1 , Debayan Gupta2 , Joan Feigenbaum2 and Rebecca N. Wright1 1

            Add to Reading List

            Source URL: work.debayangupta.com

            Language: English - Date: 2014-06-25 08:00:47
            7Secure Multiparty Computation of Approximations∗ Joan Feigenbaum† Yuval Ishai‡  Martin J. Straussk

            Secure Multiparty Computation of Approximations∗ Joan Feigenbaum† Yuval Ishai‡ Martin J. Straussk

            Add to Reading List

            Source URL: cs-www.cs.yale.edu

            Language: English - Date: 2006-09-25 10:55:42
            8MPC vs. SFE: Perfect Security in a Unified Corruption Model ? Zuzana Beerliov´a-Trub´ıniov´a, Matthias Fitzi, Martin Hirt, Ueli Maurer, and Vassilis Zikas Department of Computer Science, ETH Zurich {bzuzana,fitzi,hir

            MPC vs. SFE: Perfect Security in a Unified Corruption Model ? Zuzana Beerliov´a-Trub´ıniov´a, Matthias Fitzi, Martin Hirt, Ueli Maurer, and Vassilis Zikas Department of Computer Science, ETH Zurich {bzuzana,fitzi,hir

            Add to Reading List

            Source URL: www.cs.rpi.edu

            Language: English - Date: 2011-02-19 14:29:40
            9ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

            ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

            Add to Reading List

            Source URL: www.crypto.ethz.ch

            Language: English - Date: 2015-04-20 05:08:37
            10Forecasting Run-Times of Secure Two-Party Computation Axel Schr¨opfer Florian Kerschbaum

            Forecasting Run-Times of Secure Two-Party Computation Axel Schr¨opfer Florian Kerschbaum

            Add to Reading List

            Source URL: www.fkerschbaum.org

            Language: English - Date: 2011-09-10 05:30:51