Sciweavers

391 search results - page 22 / 79
» Secure Multiparty AES
Sort
View
FOCS
2003
IEEE
15 years 3 months ago
General Composition and Universal Composability in Secure Multi-Party Computation
Concurrent general composition relates to a setting where a secure protocol is run in a network concurrently with other, arbitrary protocols. Clearly, security in such a setting i...
Yehuda Lindell
ASIACRYPT
2008
Springer
14 years 11 months ago
Graph Design for Secure Multiparty Computation over Non-Abelian Groups
Recently, Desmedt et al. studied the problem of achieving secure n-party computation over non-Abelian groups. They considered the passive adversary model and they assumed that the...
Xiaoming Sun, Andrew Chi-Chih Yao, Christophe Tart...
75
Voted
EUROCRYPT
2010
Springer
15 years 2 months ago
Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography
Ivan Damgård, Yuval Ishai, Mikkel Krø...
ICALP
2001
Springer
15 years 2 months ago
Secure Multiparty Computation of Approximations
Joan Feigenbaum, Yuval Ishai, Tal Malkin, Kobbi Ni...
WADS
2001
Springer
105views Algorithms» more  WADS 2001»
15 years 2 months ago
Secure Multi-party Computational Geometry
Mikhail J. Atallah, Wenliang Du