Pages that link to "Item:Q3596377"
From MaRDI portal
The following pages link to Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries (Q3596377):
Displaying 26 items.
- Efficient set intersection with simulation-based security (Q271588) (← links)
- Partial fairness in secure two-party computation (Q421046) (← links)
- Efficient set operations in the presence of malicious adversaries (Q434343) (← links)
- Generic compiler for publicly verifiable covert multi-party computation (Q2056768) (← links)
- On publicly-accountable zero-knowledge and small shuffle arguments (Q2061977) (← links)
- On succinct arguments and witness encryption from groups (Q2096510) (← links)
- Black-box transformations from passive to covert security with public verifiability (Q2096543) (← links)
- Efficient compiler to covert security with public verifiability for honest majority MPC (Q2096640) (← links)
- Learning under \(p\)-tampering poisoning attacks (Q2202514) (← links)
- Cryptographic and physical zero-knowledge proof systems for solutions of Sudoku puzzles (Q2272198) (← links)
- Secure linear system computation in the presence of malicious adversaries (Q2335946) (← links)
- On actively-secure elementary MPC reductions (Q2695655) (← links)
- Secure Outsourced Computation (Q3011899) (← links)
- Secure Set Intersection with Untrusted Hardware Tokens (Q3073691) (← links)
- Almost-Optimally Fair Multiparty Coin-Tossing with Nearly Three-Quarters Malicious (Q3179362) (← links)
- From Passive to Covert Security at Low Cost (Q3408191) (← links)
- Truly Efficient String Oblivious Transfer Using Resettable Tamper-Proof Tokens (Q3408203) (← links)
- Hashing Garbled Circuits for Free (Q5270371) (← links)
- Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries (Q5445504) (← links)
- Efficient Fully-Simulatable Oblivious Transfer (Q5458932) (← links)
- Economically Optimal Variable Tag Length Message Authentication (Q5854434) (← links)
- Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries (Q5962221) (← links)
- Putting the online phase on a diet: covert security from short MACs (Q6080913) (← links)
- Almost-optimally fair multiparty coin-tossing with nearly three-quarters malicious (Q6109072) (← links)
- Financially backed covert security (Q6169029) (← links)
- Two-round stateless deterministic two-party Schnorr signatures from pseudorandom correlation functions (Q6186607) (← links)