Secure Computation from Leaky Correlated Randomness (Q3457091): Difference between revisions

From MaRDI portal
Import240304020342 (talk | contribs)
Set profile property.
ReferenceBot (talk | contribs)
Changed an Item
 
(One intermediate revision by one other user not shown)
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-662-48000-7_34 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2295623782 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Random Cayley graphs and expanders / rank
 
Normal rank
Property / cites work
 
Property / cites work: Generalized privacy amplification / rank
 
Normal rank
Property / cites work
 
Property / cites work: Privacy Amplification by Public Discussion / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Tolerant Interactive Protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure Computation against Adaptive Auxiliary Information / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data / rank
 
Normal rank
Property / cites work
 
Property / cites work: Unifying Leakage Models: From Probing Attacks to Noisy Leakage. / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Resilient Circuits without Computational Assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the asymptotic behaviour of some towers of function fields over finite fields / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tiny families of functions with random properties: A quality-size trade-off for hashing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3952016 / rank
 
Normal rank
Property / cites work
 
Property / cites work: After-the-Fact Leakage in Public-Key Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: OT-Combiners via Secure Computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Robust Combiners for Oblivious Transfer and Other Primitives / rank
 
Normal rank
Property / cites work
 
Property / cites work: Founding Cryptography on Oblivious Transfer – Efficiently / rank
 
Normal rank
Property / cites work
 
Property / cites work: Complexity of Multi-party Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Robust Combiners for Private Information Retrieval and Other Primitives / rank
 
Normal rank
Property / cites work
 
Property / cites work: Robuster Combiners for Oblivious Transfer / rank
 
Normal rank
Property / cites work
 
Property / cites work: A New Approach to Practical Active-Secure Two-Party Computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Masking against Side-Channel Attacks: A Formal Security Proof / rank
 
Normal rank
Property / cites work
 
Property / cites work: Error-Tolerant Combiners for Oblivious Primitives / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constructing locally computable extractors and cryptosystems in the bounded-storage model / rank
 
Normal rank

Latest revision as of 05:18, 11 July 2024

scientific article
Language Label Description Also known as
English
Secure Computation from Leaky Correlated Randomness
scientific article

    Statements

    Secure Computation from Leaky Correlated Randomness (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    10 December 2015
    0 references
    correlated randomness
    0 references
    random oblivious transfer (OT) correlations
    0 references
    0 references

    Identifiers