On security in encrypted computing
From MaRDI portal
Publication:2218949
DOI10.1007/978-3-030-01950-1_12zbMATH Open1497.68074DBLPconf/icics/BreuerBP018OpenAlexW2898095399WikidataQ60719248 ScholiaQ60719248MaRDI QIDQ2218949FDOQ2218949
Authors: Peter T. Breuer, Jonathan P. Bowen, Esther Palomar, Zhiming Liu
Publication date: 18 January 2021
Full work available at URL: https://doi.org/10.1007/978-3-030-01950-1_12
Recommendations
- On the power of public-key encryption in secure computation
- scientific article; zbMATH DE number 4212178
- Security in Communication Networks
- Computing on Encrypted Data
- Public‐Key Encryption and Security Notions
- Computer Security and Public Key Cryptography
- On the security of public key protocols
- Topical collection on computing on encrypted data
- Cryptography for secure encryption
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Computer security (68M25)
Cited In (5)
- Using encryption for authentication in large networks of computers
- Investigating the application of one instruction set computing for encrypted data computation
- Title not available (Why is that?)
- Computing on the edge of chaos: structure and randomness in encrypted computation
- Memory encryption: a survey of existing techniques
This page was built for publication: On security in encrypted computing
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2218949)