Founding Cryptography on Tamper-Proof Hardware Tokens (Q3408202): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Software protection and simulation on oblivious RAMs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4341756 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4934736 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5445491 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Automata, Languages and Programming / rank
 
Normal rank
Property / cites work
 
Property / cites work: Universally Composable Multi-party Computation Using Tamper-Proof Hardware / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Constructions for UC Secure Computation Using Tamper-Proof Hardware / rank
 
Normal rank
Property / cites work
 
Property / cites work: David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware / rank
 
Normal rank
Property / cites work
 
Property / cites work: Isolated Proofs of Knowledge and Isolated Zero Knowledge / rank
 
Normal rank
Property / cites work
 
Property / cites work: One-Time Programs / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Zero-One Law for Boolean Privacy / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3325625 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Founding Cryptography on Oblivious Transfer – Efficiently / rank
 
Normal rank
Property / cites work
 
Property / cites work: Resettably Secure Computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4783716 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Private Circuits II: Keeping Secrets in Tamperable Circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Truly Efficient String Oblivious Transfer Using Resettable Tamper-Proof Tokens / rank
 
Normal rank
Property / cites work
 
Property / cites work: Implications of superstrong non-locality for cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Privacy and Communication Complexity / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3787498 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Foundations of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4228503 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A minimal model for secure computation (extended abstract) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Oblivious transfers and intersecting codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3549591 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Resettable zero-knowledge (extended abstract) / rank
 
Normal rank

Latest revision as of 12:21, 2 July 2024

scientific article
Language Label Description Also known as
English
Founding Cryptography on Tamper-Proof Hardware Tokens
scientific article

    Statements

    Founding Cryptography on Tamper-Proof Hardware Tokens (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    24 February 2010
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references