The rapid development of computer network technologies and social informationalization has brought many new opportunities and challenges in information security. With improved info...
The traditional target of computer game security is mainly copy protection. The emergence of online games fundamentally changes the security requirements for computer games. Althou...
We consider a collection of related multiparty computation protocols that provide core operations for secure integer and fixed-point computation. The higher-level protocols offer...
In 2008, Wang et. al. first investigate a sort of specific secure multi-party computation--secure convex hull two-party computation, and construct two protocols based on Gift wrap...
This paper presents a novel method for designing compact yet efficient hardware implementations of the Tate pairing over supersingular curves in small characteristic. Since such cu...