## Found 12 Documents (Results 1–12)

Full Text:

### Leakage-resilience of the Shamir secret-sharing scheme against physical-bit leakages. (English)Zbl 1479.94336

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2021. 40th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, October 17–21, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12697, 344-374 (2021).
MSC:  94A62 94A60 94B05
Full Text:

### High-performance multi-party computation for binary circuits based on oblivious transfer. (English)Zbl 1470.94080

MSC:  94A60 94A62
Full Text:

### Oblivious transfer in incomplete networks. (English)Zbl 1443.94075

Beimel, Amos (ed.) et al., Theory of cryptography. 16th international conference, TCC 2018, Panaji, India, November 11–14, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11239, 389-418 (2018).
MSC:  94A60
Full Text:

### Secure computation using leaky correlations (asymptotically optimal constructions). (English)Zbl 1430.94058

Beimel, Amos (ed.) et al., Theory of cryptography. 16th international conference, TCC 2018, Panaji, India, November 11–14, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11240, 36-65 (2018).
MSC:  94A60
Full Text:

MSC:  94A60
Full Text:

### On the power of secure two-party computation. (English)Zbl 1372.94429

Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-53007-8/pbk; 978-3-662-53008-5/ebook). Lecture Notes in Computer Science 9815, 397-429 (2016).
MSC:  94A60 68P25 68M12
Full Text:

### Network oblivious transfer. (English)Zbl 1391.94772

Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-53007-8/pbk; 978-3-662-53008-5/ebook). Lecture Notes in Computer Science 9815, 366-396 (2016).
MSC:  94A60 68M12
Full Text:

### Secret sharing schemes with algebraic properties and applications. (English)Zbl 1479.94301

Beckmann, Arnold (ed.) et al., Pursuit of the universal. 12th conference on computability in Europe, CiE 2016, Paris, France, June 27 – July 1, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9709, 68-77 (2016).
MSC:  94A62
Full Text:

### On the complexity of additively homomorphic UC commitments. (English)Zbl 1388.94055

Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49095-2/pbk; 978-3-662-49096-9/ebook). Lecture Notes in Computer Science 9562, 542-565 (2016).
MSC:  94A60
Full Text:

### Secure computation from leaky correlated randomness. (English)Zbl 1352.94038

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). Lecture Notes in Computer Science 9216, 701-720 (2015).
MSC:  94A60 68Q87
Full Text:

MSC:  94A62
Full Text:

all top 5

all top 3