Information Security and Cryptology - ICISC 2005
From MaRDI portal
Publication:5899280
Recommendations
- scientific article; zbMATH DE number 1808209
- scientific article; zbMATH DE number 176564
- Secure Multi-Party Computation for Elliptic Curves
- Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations
- Practical Two-Party Computation Based on the Conditional Gate
Cited in
(9)- An ElGamal-like cryptosystem for enciphering large messages
- A blind coupon mechanism enabling veto voting over unreliable networks
- Provably secure fair mutual private set intersection cardinality utilizing Bloom filter
- New realizations of efficient and secure private set intersection protocols preserving fairness
- Computationally secure pattern matching in the presence of malicious adversaries
- A verifiable secret shuffle of homomorphic encryptions
- Secure parameterized pattern matching
- Fair Traceable Multi-Group Signatures
- The Power of Anonymous Veto in Public Discussion
This page was built for publication: Information Security and Cryptology - ICISC 2005
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5899280)