A Practical Approach to the Secure Computation of the Moore-Penrose Pseudoinverse over the Rationals

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ACNS (18. : 2020 : Online) Applied cryptography and network security ; Part 1
1. Verfasser: Bouman, Niek J. (VerfasserIn)
Weitere Verfasser: Vreede, Niels de (VerfasserIn)
Pages:1
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Secure and Efficient Delegation of Elliptic-Curve Pairing 2020 Crescenzo, Giovanni Di
How Not to Create an Isogeny-Based PAKE 2020 Azarderakhsh, Reza
New Methods and Abstractions for RSA-Based Forward Secure Signatures 2020 Hohenberger, Susan
Timed Signatures and Zero-Knowledge Proofs—Timestamping in the Blockchain Era— 2020 Abadi, Aydin
Minting Mechanism for Proof of Stake Blockchains 2020 Deuber, Dominic
A Practical Approach to the Secure Computation of the Moore-Penrose Pseudoinverse over the Rationals 2020 Bouman, Niek J.
Improved Building Blocks for Secure Multi-party Computation Based on Secret Sharing with Honest Majority 2020 Blanton, Marina
The Lattice-Based Digital Signature Scheme qTESLA 2020 Alkim, Erdem
Communication-Efficient Proactive Secret Sharing for Dynamic Groups with Dishonest Majorities 2020 Eldefrawy, Karim
Trapdoor Delegation and HIBE from Middle-Product LWE in Standard Model 2020 Le, Huy Quoc
Efficient AGCD-Based Homomorphic Encryption for Matrix and Vector Arithmetic 2020 Pereira, Hilder Vitor Lima
Offline Witness Encryption with Semi-adaptive Security 2020 Chvojka, Peter
ACE in Chains: How Risky Is CBC Encryption of Binary Executable Files? 2020 Fujita, Rintaro
An Efficient Secure Division Protocol Using Approximate Multi-bit Product and New Constant-Round Building Blocks 2020 Hiwatashi, Keitaro
Saber on ESP32 2020 Wang, Bin
Further Optimizations of CSIDH: A Systematic Approach to Efficient Strategies, Permutations, Bound Vectors 2020 Hutchinson, Aaron
Random Walks and Concurrent Zero-Knowledge 2020 Aiyer, Anand
Tweaking Key-Alternating Feistel Block Ciphers 2020 Yan, Hailun
Classical Misuse Attacks on NIST Round 2 PQC 2020 Huguenin-Dumittan, Loïs
Efficient Anonymous Multi-group Broadcast Encryption 2020 Kim, Intae
Alle Artikel auflisten