Sciweavers

391 search results - page 39 / 79
» Secure Multiparty AES
Sort
View
IHI
2010
124views Healthcare» more  IHI 2010»
14 years 7 months ago
Reliable medical recommendation systems with patient privacy
One of the concerns patients have when confronted with a medical condition is which physician to trust. Any recommendation system that seeks to answer this question must ensure an...
T. Ryan Hoens, Marina Blanton, Nitesh V. Chawla
82
Voted
PODC
2010
ACM
15 years 21 days ago
On the theoretical gap between synchronous and asynchronous MPC protocols
Multiparty computation (MPC) protocols among n parties secure against t active faults are known to exist if and only if
Zuzana Beerliová-Trubíniová, ...
CORR
2008
Springer
133views Education» more  CORR 2008»
15 years 18 days ago
A New Stream Cipher: Dicing
: In this paper, we will propose a new synchronous stream cipher named DICING, which can be taken as a clock-controlled one but with a new mechanism of altering steps. With the sim...
An-Ping Li
80
Voted
IACR
2011
134views more  IACR 2011»
14 years 4 days ago
Efficient Implementation of Grand Cru with TI C6x+ Processor
Grand Cru, a candidate cipher algorithm of NESSIE project, is based on the strategy of multiple layered security and derived from AES-128. This algorithm was not selected for secon...
Azhar Ali Khan, Ghulam Murtaza
76
Voted
CTRSA
2009
Springer
106views Cryptology» more  CTRSA 2009»
15 years 4 months ago
Communication-Efficient Private Protocols for Longest Common Subsequence
We design communication efficient two-party and multi-party protocols for the longest common subsequence (LCS) and related problems. Our protocols achieve privacy with respect to p...
Matthew K. Franklin, Mark Gondree, Payman Mohassel