Search results

From MaRDI portal
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • Date of Publication Type Private set operations from oblivious switching 2021-12-21 Paper Actively Secure Private Function Evaluation 2015-01-06 Paper How...
    10 bytes (16 words) - 00:22, 25 September 2023
  • Probabilistic quorum systems 2017-09-29 Paper Selective private function evaluation with applications to private statistics 2016-03-04 Paper Secure multiparty computation...
    10 bytes (18 words) - 08:50, 13 December 2023
  • in MPC an Efficient Framework for Private Function Evaluation 2013-05-31 Paper Rate-Limited Secure Function Evaluation: Definitions and Constructions 2013-04-19...
    10 bytes (16 words) - 11:02, 6 October 2023
  • partially authenticated networks 2013-06-07 Paper Constant-Round Private Function Evaluation with Linear Complexity 2011-12-02 Paper How to Achieve Perfect...
    10 bytes (16 words) - 06:39, 7 October 2023
  • Block Ciphers 2010-12-07 Paper Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authentication 2010-11-23 Paper...
    10 bytes (16 words) - 09:47, 6 October 2023
  • Probabilistic quorum systems 2017-09-29 Paper Selective private function evaluation with applications to private statistics 2016-03-04 Paper On k -set consensus...
    10 bytes (19 words) - 12:23, 28 January 2024
  • Side Channel Can Go a Long Way 2015-07-21 Paper Actively Secure Private Function Evaluation 2015-01-06 Paper Practical Covertly Secure MPC for Dishonest Majority...
    10 bytes (19 words) - 07:08, 9 December 2023
  • Threshold Trust 2011-04-20 Paper Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authentication 2010-11-23 Paper...
    10 bytes (17 words) - 12:50, 6 October 2023
  • password-only authenticated key exchange 2012-05-11 Paper Constant-Round Private Function Evaluation with Linear Complexity 2011-12-02 Paper Round-Optimal Password-Based...
    10 bytes (19 words) - 17:09, 11 December 2023
  • targeting Markov segments 2016-09-29 Paper Selective private function evaluation with applications to private statistics 2016-03-04 Paper https://portal.mardi4nfdi...
    10 bytes (17 words) - 13:25, 6 October 2023
  • Selective private function evaluation with applications to private statistics 2016-03-04 Paper Approximating the Influence of Monotone Boolean Functions in O(√n)...
    10 bytes (17 words) - 14:14, 7 October 2023
  • Intractability of Obfuscated Pseudorandom Functions 2016-03-23 Paper Selective private function evaluation with applications to private statistics 2016-03-04 Paper A...
    10 bytes (17 words) - 14:12, 24 September 2023
  • 2015-09-02 Paper Private approximation of NP-hard functions 2015-02-27 Paper Communication preserving protocols for secure function evaluation 2015-02-27 Paper...
    10 bytes (17 words) - 03:10, 10 December 2023
  • Selective private function evaluation with applications to private statistics 2016-03-04 Paper Universal service-providers for database private information...
    10 bytes (16 words) - 17:53, 24 September 2023
  • Cryptanalysis and improvement of several quantum private comparison protocols 2021-01-12 Paper New quantum private comparison protocol without a third party 2020-06-19...
    10 bytes (16 words) - 13:34, 11 December 2023
  • empirical models in dynamic econometrics 1982-01-01 Paper On the evaluation of poly-t density functions 1980-01-01 Paper Models with Several Regimes and Changes...
    10 bytes (19 words) - 22:12, 10 December 2023
  • communication complexity of threshold private set intersection 2020-03-09 Paper An algebraic approach to maliciously secure private set intersection 2020-02-04 Paper...
    10 bytes (16 words) - 12:15, 7 October 2023
  • equilibrium methodology applied to the design, implementation and performance evaluation of large, multi-market and multi-unit policy constrained auctions 2023-07-03...
    10 bytes (18 words) - 17:52, 7 December 2023
  • circuits 2022-03-31 Paper PSI from PaXoS: fast, malicious private set intersection 2022-03-23 Paper Private set operations from oblivious switching 2021-12-21...
    10 bytes (16 words) - 10:44, 24 September 2023
  • Smaller Hash Families and Faster Evaluation 2013-09-25 Paper Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption 2013-09-17...
    10 bytes (16 words) - 14:14, 7 October 2023
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)