×

Found 20 Documents (Results 1–20)

Abuse resistant law enforcement access systems. (English) Zbl 1479.94181

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2021. 40th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, October 17–21, 2021. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12698, 553-583 (2021).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

The price of active security in cryptographic protocols. (English) Zbl 1493.94034

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12106, 184-215 (2020).
MSC:  94A60 68P25 68N20
PDF BibTeX XML Cite
Full Text: DOI

Going beyond dual execution: MPC for functions with efficient verification. (English) Zbl 07436977

Kiayias, Aggelos (ed.) et al., Public-key cryptography – PKC 2020. 23rd IACR international conference on practice and theory of public-key cryptography, Edinburgh, UK, May 4–7, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12111, 328-356 (2020).
MSC:  68P25 94A62 94A60
PDF BibTeX XML Cite
Full Text: DOI

On multiparty garbling of arithmetic circuits. (English) Zbl 1447.94020

Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 11274, 3-33 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Block cipher invariants as eigenvectors of correlation matrices. (English) Zbl 1446.94102

Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11272, 3-31 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Non-interactive secure 2PC in the offline/online and batch settings. (English) Zbl 1415.94451

Coron, Jean-Sébastien (ed.) et al., Advances in cryptology – EUROCRYPT 2017. 36th annual international conference on the theory and applications of cryptographic techniques, Paris, France, April 30 – May 4, 2017. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 10212, 425-455 (2017).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Reactive garbling: foundation, instantiation, application. (English) Zbl 1407.94145

Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4-8, 2016. Proceedings. Part II. Berlin: Springer. Lect. Notes Comput. Sci. 10032, 1022-1052 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

How to circumvent the two-ciphertext lower bound for linear garbling schemes. (English) Zbl 1407.94127

Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4-8, 2016. Proceedings. Part II. Berlin: Springer. Lect. Notes Comput. Sci. 10032, 967-997 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Cross and clean: amortized garbled circuits with constant overhead. (English) Zbl 1406.94076

Hirt, Martin (ed.) et al., Theory of cryptography. 14th international conference, TCC 2016-B, Beijing, China, October 31 – November 3, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53640-7/pbk; 978-3-662-53641-4/ebook). Lecture Notes in Computer Science 9985, 582-603 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Constant-round maliciously secure two-party computation in the RAM model. (English) Zbl 1406.94062

Hirt, Martin (ed.) et al., Theory of cryptography. 14th international conference, TCC 2016-B, Beijing, China, October 31 – November 3, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53640-7/pbk; 978-3-662-53641-4/ebook). Lecture Notes in Computer Science 9985, 521-553 (2016).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI

Secure multiparty RAM computation in constant rounds. (English) Zbl 1406.94055

Hirt, Martin (ed.) et al., Theory of cryptography. 14th international conference, TCC 2016-B, Beijing, China, October 31 – November 3, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53640-7/pbk; 978-3-662-53641-4/ebook). Lecture Notes in Computer Science 9985, 491-520 (2016).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI

How to prove knowledge of small secrets. (English) Zbl 1406.94024

Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part III. Berlin: Springer (ISBN 978-3-662-53014-6/pbk; 978-3-662-53015-3/ebook). Lecture Notes in Computer Science 9816, 478-498 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

On the complexity of additively homomorphic UC commitments. (English) Zbl 1388.94055

Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49095-2/pbk; 978-3-662-49096-9/ebook). Lecture Notes in Computer Science 9562, 542-565 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Filter Results by …

Document Type

Reviewing State

all top 5

Year of Publication

Main Field

all top 3

Software