×

Found 23 Documents (Results 1–23)

High-throughput secure three-party computation for malicious adversaries and an honest majority. (English) Zbl 1415.94431

Coron, Jean-Sébastien (ed.) et al., Advances in cryptology – EUROCRYPT 2017. 36th annual international conference on the theory and applications of cryptographic techniques, Paris, France, April 30 – May 4, 2017. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10211, 225-255 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

More efficient constant-round multi-party computation from BMR and SHE. (English) Zbl 1406.94071

Hirt, Martin (ed.) et al., Theory of cryptography. 14th international conference, TCC 2016-B, Beijing, China, October 31 – November 3, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53640-7/pbk; 978-3-662-53641-4/ebook). Lecture Notes in Computer Science 9985, 554-581 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries. (English) Zbl 1162.94367

Canetti, Ran (ed.), Theory of cryptography. Fifth theory of cryptography conference, TCC 2008, New York, USA, March 19–21, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78524-8/pbk). Lecture Notes in Computer Science 4948, 155-175 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Year of Publication

Main Field

Software