Pages that link to "Item:Q5458612"
From MaRDI portal
The following pages link to David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware (Q5458612):
Displaying 12 items.
- Pattern matching on encrypted streams (Q1633445) (← links)
- Non-interactive secure computation from one-way functions (Q1710666) (← links)
- Everlasting UC commitments from fully malicious PUFs (Q2155992) (← links)
- (Efficient) universally composable oblivious transfer using a minimal number of stateless tokens (Q2423844) (← links)
- UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens (Q2829948) (← links)
- Weakening the Isolation Assumption of Tamper-Proof Hardware Tokens (Q2947531) (← links)
- Secure Outsourced Computation (Q3011899) (← links)
- Secure Set Intersection with Untrusted Hardware Tokens (Q3073691) (← links)
- Composable Security in the Tamper-Proof Hardware Model Under Minimal Complexity (Q3179364) (← links)
- Founding Cryptography on Tamper-Proof Hardware Tokens (Q3408202) (← links)
- One-Time Programs (Q3600212) (← links)
- Constant Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model (Q5738764) (← links)