Secure computation without computers (Q517015): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
Property / cites work
 
Property / cites work: Secret-Sharing Schemes: A Survey / rank
 
Normal rank
Property / cites work
 
Property / cites work: Functional Encryption: Definitions and Challenges / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the size of shares for secret sharing schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security and composition of multiparty cryptographic protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2965402 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Private Visual Share-Homomorphic Computation and Randomness Reduction in Visual Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Foundations of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Founding Cryptography on Tamper-Proof Hardware Tokens / rank
 
Normal rank
Property / cites work
 
Property / cites work: Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Software protection and simulation on oblivious RAMs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4474165 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4737161 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On secret sharing systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Gate Evaluation Secret Sharing and Secure One-Round Two-Party Computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Information-theoretically secure protocols and security under composition / rank
 
Normal rank
Property / cites work
 
Property / cites work: A proof of security of Yao's protocol for two-party computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Basing cryptographic protocols on tamper-evident seals / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4364561 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4365722 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4344138 / rank
 
Normal rank

Revision as of 12:59, 13 July 2024

scientific article
Language Label Description Also known as
English
Secure computation without computers
scientific article

    Statements

    Secure computation without computers (English)
    0 references
    0 references
    0 references
    16 March 2017
    0 references
    Yao's construction
    0 references
    visual cryptography
    0 references
    secure computation
    0 references

    Identifiers