Secure Multiparty AES
From MaRDI portal
Publication:3583564
Recommendations
- Improving the efficiency of AES protocols in multi-party computation
- scientific article; zbMATH DE number 1583776
- Higher-order glitches free implementation of the AES using secure multi-party computation protocols
- Security and composition of multiparty cryptographic protocols
- Implementing AES via an actively/covertly secure dishonest-majority MPC protocol
- An efficient and secure protocol for multi-party key establishment
- Secure multiparty computation and secret sharing
- Secure Multi-Party Computation for Elliptic Curves
- Multiparty Computation from Somewhat Homomorphic Encryption
Cited in
(12)- Monomial evaluation of polynomial functions protected by threshold implementations -- with an illustration on AES -- extended version
- 3-party secure computation for RAMs: optimal and concretely efficient
- Faster secure multi-party computation of AES and DES using lookup tables
- Implementing AES via an actively/covertly secure dishonest-majority MPC protocol
- MPC-friendly symmetric cryptography from alternating moduli: candidates, protocols, and applications
- Improving the efficiency of AES protocols in multi-party computation
- Adaptively secure threshold symmetric-key encryption
- BBQ: using AES in Picnic signatures
- From oblivious AES to efficient and secure database join in the multiparty setting
- Secure two-party computation is practical
- Fully homomorphic SIMD operations
- Efficient lookup-table protocol in secure multiparty computation
This page was built for publication: Secure Multiparty AES
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3583564)