Secure Two-Party Computation in a Quantum World

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ACNS (18. : 2020 : Online) Applied cryptography and network security ; Part 1
1. Verfasser: Büscher, Niklas (VerfasserIn)
Weitere Verfasser: Demmler, Daniel (VerfasserIn), Karvelas, Nikolaos P. (VerfasserIn), Katzenbeisser, Stefan (VerfasserIn), Krämer, Juliane (VerfasserIn), Rathee, Deevashwer (VerfasserIn), Schneider, Thomas (VerfasserIn), Struck, Patrick (VerfasserIn)
Pages:1
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Secure and Efficient Delegation of Elliptic-Curve Pairing 2020 Crescenzo, Giovanni Di
How Not to Create an Isogeny-Based PAKE 2020 Azarderakhsh, Reza
New Methods and Abstractions for RSA-Based Forward Secure Signatures 2020 Hohenberger, Susan
Timed Signatures and Zero-Knowledge Proofs—Timestamping in the Blockchain Era— 2020 Abadi, Aydin
Minting Mechanism for Proof of Stake Blockchains 2020 Deuber, Dominic
A Practical Approach to the Secure Computation of the Moore-Penrose Pseudoinverse over the Rationals 2020 Bouman, Niek J.
Improved Building Blocks for Secure Multi-party Computation Based on Secret Sharing with Honest Majority 2020 Blanton, Marina
The Lattice-Based Digital Signature Scheme qTESLA 2020 Alkim, Erdem
Communication-Efficient Proactive Secret Sharing for Dynamic Groups with Dishonest Majorities 2020 Eldefrawy, Karim
Trapdoor Delegation and HIBE from Middle-Product LWE in Standard Model 2020 Le, Huy Quoc
Efficient AGCD-Based Homomorphic Encryption for Matrix and Vector Arithmetic 2020 Pereira, Hilder Vitor Lima
Offline Witness Encryption with Semi-adaptive Security 2020 Chvojka, Peter
ACE in Chains: How Risky Is CBC Encryption of Binary Executable Files? 2020 Fujita, Rintaro
An Efficient Secure Division Protocol Using Approximate Multi-bit Product and New Constant-Round Building Blocks 2020 Hiwatashi, Keitaro
Saber on ESP32 2020 Wang, Bin
Further Optimizations of CSIDH: A Systematic Approach to Efficient Strategies, Permutations, Bound Vectors 2020 Hutchinson, Aaron
Lesamnta-LW Revisited: Improved Security Analysis of Primitive and New PRF Mode 2020 Hirose, Shoichi
Rotational Cryptanalysis on MAC Algorithm Chaskey 2020 Kraleva, Liliya
Improving the Efficiency of Re-randomizable and Replayable CCA Secure Public Key Encryption 2020 Faonio, Antonio
Random Walks and Concurrent Zero-Knowledge 2020 Aiyer, Anand
Alle Artikel auflisten