Actively Secure Private Function Evaluation (Englisch)
- Neue Suche nach: Mohassel, P.
- Neue Suche nach: Sadeghian, S.
- Neue Suche nach: Smart, N.P.
- Neue Suche nach: Mohassel, P.
- Neue Suche nach: Sadeghian, S.
- Neue Suche nach: Smart, N.P.
- Neue Suche nach: Sarkar, Palash
- Neue Suche nach: Iwata, Tetsu
In:
Theory and application of cryptology and information security; Advances in cryptology - ASIACRYPT 2014
8874
;
486-505
;
2014
-
ISBN:
-
ISSN:
- Aufsatz (Konferenz) / Print
-
Titel:Actively Secure Private Function Evaluation
-
Beteiligte:Mohassel, P. ( Autor:in ) / Sadeghian, S. ( Autor:in ) / Smart, N.P. ( Autor:in ) / Sarkar, Palash / Iwata, Tetsu
-
Kongress:International conference; 20th, Theory and application of cryptology and information security; Advances in cryptology - ASIACRYPT 2014 ; 2014 ; Kaohsiung, Taiwan
-
Erschienen in:Theory and application of cryptology and information security; Advances in cryptology - ASIACRYPT 2014 , 8874 ; 486-505LECTURE NOTES IN COMPUTER SCIENCE , 8874 ; 486-505
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:Heidelberg
-
Erscheinungsdatum:01.01.2014
-
Format / Umfang:20 pages
-
Anmerkungen:"e-ISSN 1611-3349" --Title page verso. Includes bibliographical references and indexes. Also issued online.
-
ISBN:
-
ISSN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Solving LPN Using Covering CodesGuo, Q. / Johansson, T. / Londahl, C. et al. | 2014
- 1
-
Concise Multi-challenge CCA-Secure Encryption and Signatures with Almost Tight SecurityLibert, B. / Joye, M. / Yung, M. / Peters, T. et al. | 2014
- 21
-
Algebraic Attack against Variants of McEliece with Goppa Polynomial of a Special FormFaugere, J.-C. / Perret, L. / de Portzamparc, F. et al. | 2014
- 22
-
Efficient Identity-Based Encryption over NTRU LatticesDucas, L. / Lyubashevsky, V. / Prest, T. et al. | 2014
- 42
-
Order-Preserving Encryption Secure Beyond One-WaynessTeranishi, I. / Yung, M. / Malkin, T. et al. | 2014
- 42
-
Bivariate Polynomials Modulo Composites and Their ApplicationsBoneh, D. / Corrigan-Gibbs, H. et al. | 2014
- 62
-
Statistically-secure ORAM with O(log^2 n) OverheadChung, K.-M. / Liu, Z. / Pass, R. et al. | 2014
- 63
-
Cryptographic Schemes Based on the ASASA Structure: Black-box, White-box, and Public-key (Extended Abstract)Biryukov, A. / Bouillaguet, C. / Khovratovich, D. et al. | 2014
- 82
-
Adaptive Security of Constrained PRFsFuchsbauer, G. / Konstantinov, M. / Pietrzak, K. / Rao, V. et al. | 2014
- 85
-
Beyond 2^c^/^2 Security in Sponge-Based Authenticated Encryption ModesJovanovic, P. / Luykx, A. / Mennink, B. et al. | 2014
- 102
-
Poly-Many Hardcore Bits for Any One-Way Function and a Framework for Differing-Inputs ObfuscationBellare, M. / Stepanovs, I. / Tessaro, S. et al. | 2014
- 105
-
How to Securely Release Unverified Plaintext in Authenticated EncryptionAndreeva, E. / Bogdanov, A. / Luykx, A. / Mennink, B. / Mouha, N. / Yasuda, K. et al. | 2014
- 122
-
Using Indistinguishability Obfuscation via UCEsBrzuska, C. / Mittelbach, A. et al. | 2014
- 126
-
Forging Attacks on Two Authenticated Encryption Schemes COBRA and POETNandi, M. et al. | 2014
- 141
-
Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128Emami, S. / Ling, S. / Nikolic, I. / Pieprzyk, J. / Wang, H. et al. | 2014
- 142
-
Indistinguishability Obfuscation versus Multi-bit Point Obfuscation with Auxiliary InputBrzuska, C. / Mittelbach, A. et al. | 2014
- 158
-
Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block CiphersSun, S. / Hu, L. / Wang, P. / Qiao, K. / Ma, X. / Song, L. et al. | 2014
- 162
-
Bootstrapping Obfuscators via Fast Pseudorandom FunctionsApplebaum, B. et al. | 2014
- 173
-
Homomorphic Authenticated Encryption Secure against Chosen-Ciphertext AttackJoo, C. / Yun, A. et al. | 2014
- 179
-
Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and SimonBoura, C. / Naya-Plasencia, M. / Suder, V. et al. | 2014
- 193
-
Authenticating Computation on Groups: New Homomorphic Primitives and ApplicationsCatalano, D. / Marcedone, A. / Puglisi, O. et al. | 2014
- 200
-
A Simplified Representation of AESGilbert, H. et al. | 2014
- 213
-
Compact VSS and Efficient Homomorphic UC CommitmentsDamgard, I. / David, B. / Giacomelli, I. / Nielsen, J.B. et al. | 2014
- 223
-
Simulatable Leakage: Analysis, Pitfalls, and New ConstructionsLongo, J. / Martin, D.P. / Oswald, E. / Page, D. / Stam, M. / Tunstall, M.J. et al. | 2014
- 233
-
Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only ModelJarecki, S. / Kiayias, A. / Krawczyk, H. et al. | 2014
- 243
-
Multi-target DPA Attacks: Pushing DPA Beyond the Limits of a Desktop ComputerMather, L. / Oswald, E. / Whitnall, C. et al. | 2014
- 254
-
Secret-Sharing for NPKomargodski, I. / Naor, M. / Yogev, E. et al. | 2014
- 262
-
GLV/GLS Decomposition, Power Analysis, and Attacks on ECDSA Signatures with Single-Bit Nonce BiasAranha, D.F. / Fouque, P.-A. / Gerard, B. / Kammerer, J.-G. / Tibouchi, M. / Zapalowicz, J.-C. et al. | 2014
- 274
-
Tweaks and Keys for Block Ciphers: The TWEAKEY FrameworkJean, J. / Nikolic, I. / Peyrin, T. et al. | 2014
- 282
-
Soft Analytical Side-Channel AttacksVeyrat-Charvillon, N. / Gerard, B. / Standaert, F.-X. et al. | 2014
- 289
-
Memory-Demanding Password ScramblingForler, C. / Lucks, S. / Wenzel, J. et al. | 2014
- 297
-
On the Enumeration of Double-Base Chains with Applications to Elliptic Curve CryptographyDoche, C. et al. | 2014
- 306
-
Side-Channel Analysis of Multiplications in GF(2^1^2^8): Application to AES-GCMBelaid, S. / Fouque, P.-A. / Gerard, B. et al. | 2014
- 317
-
Kummer Strikes Back: New DH Speed RecordsBernstein, D.J. / Chuengsatiansup, C. / Lange, T. / Schwabe, P. et al. | 2014
- 326
-
Higher-Order Threshold ImplementationsBilgin, B. / Gierlichs, B. / Nikova, S. / Nikov, V. / Rijmen, V. et al. | 2014
- 338
-
Jacobian Coordinates on Genus 2 CurvesHisil, H. / Costello, C. et al. | 2014
- 344
-
Masks Will Fall Off: Higher-Order Optimal DistinguishersBruneau, N. / Guilley, S. / Heuser, A. / Rioul, O. et al. | 2014
- 358
-
Mersenne Factorization FactoryKleinjung, T. / Bos, J.W. / Lenstra, A.K. et al. | 2014
- 366
-
Black-Box Separations for One-More (Static) CDH and Its GeneralizationZhang, J. / Zhang, Z. / Chen, Y. / Guo, Y. et al. | 2014
- 378
-
Improving the Polynomial time Precomputation of Frobenius Representation Discrete Logarithm Algorithms: Simplified Setting for Small Characteristic Finite FieldsJoux, A. / Pierrot, C. et al. | 2014
- 386
-
Black-Box Separations for Differentially Private ProtocolsKhurana, D. / Maji, H.K. / Sahai, A. et al. | 2014
- 398
-
Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper)Paterson, K.G. / Poettering, B. / Schuldt, J.C.N. et al. | 2014
- 406
-
Composable Security of Delegated Quantum ComputationDunjko, V. / Fitzsimons, J.F. / Portmann, C. / Renner, R. et al. | 2014
- 420
-
Multi-user Collisions: Applications to Discrete Logarithm, Even-Mansour and PRINCEFouque, P.-A. / Joux, A. / Mavromati, C. et al. | 2014
- 426
-
All-But-Many Encryption: A New Framework for Fully-Equipped UC CommitmentsFujisaki, E. et al. | 2014
- 439
-
Cryptanalysis of Iterated Even-Mansour Schemes with Two KeysDinur, I. / Dunkelman, O. / Keller, N. / Shamir, A. et al. | 2014
- 448
-
Multi-valued Byzantine Broadcast: The t < n CaseHirt, M. / Raykov, P. et al. | 2014
- 448
-
Multi-valued Byzantine Broadcast: The t < n CaseHirt, Martin / Raykov, Pavel et al. | 2014
- 458
-
Meet-in-the-Middle Attacks on Generic Feistel ConstructionsGuo, J. / Jean, J. / Nikolic, I. / Sasaki, Y. et al. | 2014
- 466
-
Fairness versus Guaranteed Output Delivery in Secure Multiparty ComputationCohen, R. / Lindell, Y. et al. | 2014
- 478
-
XLS is Not a Strong Pseudorandom PermutationNandi, M. et al. | 2014
- 486
-
Actively Secure Private Function EvaluationMohassel, P. / Sadeghian, S. / Smart, N.P. et al. | 2014
- 491
-
Structure-Preserving Signatures on Equivalence Classes and Their Application to Anonymous CredentialsHanser, C. / Slamanig, D. et al. | 2014
- 506
-
Efficient, Oblivious Data Structures for MPCKeller, M. / Scholl, P. et al. | 2014
- 512
-
On Tight Security Proofs for Schnorr SignaturesFleischhacker, N. / Jager, T. / Schroder, D. et al. | 2014
- 532
-
Square Span Programs with Applications to Succinct NIZK ArgumentsDanezis, G. / Fournet, C. / Groth, J. / Kohlweiss, M. et al. | 2014
- 551
-
Better Zero-Knowledge Proofs for Lattice Encryption and Their Application to Group SignaturesBenhamouda, F. / Camenisch, J. / Krenn, S. / Lyubashevsky, V. / Neven, G. et al. | 2014