Sciweavers

2108 search results - page 156 / 422
» Encrypted
Sort
View
116
Voted
CRYPTO
2011
Springer
176views Cryptology» more  CRYPTO 2011»
14 years 3 months ago
Authenticated and Misuse-Resistant Encryption of Key-Dependent Data
Mihir Bellare, Sriram Keelveedhi
77
Voted
IACR
2011
89views more  IACR 2011»
14 years 3 months ago
Threshold Fully Homomorphic Encryption and Secure Computation
Steven Myers, Mona Sergi, Abhi Shelat
142
Voted
CRYPTO
2012
Springer
277views Cryptology» more  CRYPTO 2012»
13 years 6 months ago
Multiparty Computation from Somewhat Homomorphic Encryption
We propose a general multiparty computation protocol secure against an active adversary corrupting up to n−1 of the n players. The protocol may be used to compute securely arithm...
Ivan Damgård, Valerio Pastro, Nigel P. Smart...