Secure Protocol Transformations (Q2829224): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
(2 intermediate revisions by 2 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-662-53008-5_15 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2495326230 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Computing Algebraic Formulas Using a Constant Number of Registers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority / rank
 
Normal rank
Property / cites work
 
Property / cites work: An <i>O</i> (log <i>n</i> ) expected rounds randomized byzantine generals protocol / rank
 
Normal rank
Property / cites work
 
Property / cites work: Unconditionally-Secure Robust Secret Sharing with Compact Shares / rank
 
Normal rank
Property / cites work
 
Property / cites work: Algebraic Geometric Secret Sharing Schemes and Secure Multi-Party Computations over Small Fields / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4250770 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4783743 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Scalable Secure Multiparty Computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Circuits resilient to additive attacks with applications to secure computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Foundations of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: The knowledge complexity of interactive proof-systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Power of Secure Two-Party Computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Upper Bounds on the Communication Complexity of Optimally Resilient Cryptographic Multiparty Computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3549593 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure Multi-Party Computation with Identifiable Abort / rank
 
Normal rank
Property / cites work
 
Property / cites work: Founding Cryptography on Oblivious Transfer – Efficiently / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure Arithmetic Computation with No Honest Majority / rank
 
Normal rank
Property / cites work
 
Property / cites work: Systematizing Secure Computation for Research and Decision Support / rank
 
Normal rank
Property / cites work
 
Property / cites work: Must You Know the Code of f to Securely Compute f? / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to share a secret / rank
 
Normal rank

Latest revision as of 20:27, 12 July 2024

scientific article
Language Label Description Also known as
English
Secure Protocol Transformations
scientific article

    Statements

    Secure Protocol Transformations (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    27 October 2016
    0 references
    0 references
    0 references