On Concurrently Secure Computation in the Multiple Ideal Query Model (Englisch)
- Neue Suche nach: Goyal, Vipul
- Neue Suche nach: Jain, Abhishek
- Neue Suche nach: Goyal, Vipul
- Neue Suche nach: Jain, Abhishek
In:
Advances in Cryptology, EUROCRYPT, Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2013
;
684-701
;
2013
-
ISSN:
- Aufsatz (Konferenz) / Print
-
Titel:On Concurrently Secure Computation in the Multiple Ideal Query Model
-
Beteiligte:Goyal, Vipul ( Autor:in ) / Jain, Abhishek ( Autor:in )
-
Erschienen in:Lecture Notes in Computer Science ; 7881 ; 684-701
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:2013
-
Format / Umfang:18 Seiten
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Candidate Multilinear Maps from Ideal LatticesGarg, S. / Gentry, C. / Halevi, S. et al. | 2013
- 18
-
Lossy Codes and a New Variant of the Learning-With-Errors ProblemDottling, N. / Muller-Quade, J. et al. | 2013
- 35
-
A Toolkit for Ring-LWE CryptographyLyubashevsky, V. / Peikert, C. / Regev, O. et al. | 2013
- 55
-
Regularity of Lossy RSA on Subdomains and Its ApplicationsLewko, M. / O Neill, A. / Smith, A. et al. | 2013
- 76
-
Efficient Cryptosystems from 2^k-th Power Residue SymbolsJoye, M. / Libert, B. et al. | 2013
- 93
-
Deterministic Public-Key Encryption for Adaptively Chosen Plaintext DistributionsRaghunathan, A. / Segev, G. / Vadhan, S. et al. | 2013
- 111
-
How to Watermark Cryptographic FunctionsNishimaki, R. et al. | 2013
- 126
-
Security Evaluations beyond Computing Power: How to Analyze Side-Channel Attacks You Cannot Mount?Veyrat-Charvillon, N. / Gerard, B. / Standaert, F.-X. et al. | 2013
- 142
-
Masking against Side-Channel Attacks: A Formal Security ProofProuff, E. / Rivain, M. et al. | 2013
- 160
-
Leakage-Resilient Cryptography from Minimal AssumptionsHazay, C. / Lopez-Alt, A. / Wee, H. / Wichs, D. et al. | 2013
- 177
-
Faster Index Calculus for the Medium Prime Case Application to 1175-bit and 1425-bit Finite FieldsJoux, A. et al. | 2013
- 194
-
Fast Cryptography in Genus 2Bos, J.W. / Costello, C. / Hisil, H. / Lauter, K. et al. | 2013
- 211
-
Graph-Theoretic Algorithms for the ``Isomorphism of Polynomials'' ProblemBouillaguet, C. / Fouque, P.-A. / Veber, A. et al. | 2013
- 228
-
Cryptanalysis of Full RIPEMD-128Landelle, F. / Peyrin, T. et al. | 2013
- 245
-
New Collision Attacks on SHA-1 Based on Optimal Joint Local-Collision AnalysisStevens, M. et al. | 2013
- 262
-
Improving Local Collisions: New Attacks on Reduced SHA-256Mendel, F. / Nad, T. / Schlaffer, M. et al. | 2013
- 279
-
Dynamic Proofs of Retrievability via Oblivious RAMCash, D. / Kupcu, A. / Wichs, D. et al. | 2013
- 296
-
Message-Locked Encryption and Secure DeduplicationBellare, M. / Keelveedhi, S. / Ristenpart, T. et al. | 2013
- 313
-
KeccakBertoni, G. / Daemen, J. / Peeters, M. / Van Assche, G. et al. | 2013
- 315
-
Batch Fully Homomorphic Encryption over the IntegersCheon, J.H. / Coron, J.-S. / Kim, J. / Lee, M.S. / Lepoint, T. / Tibouchi, M. / Yun, A. et al. | 2013
- 336
-
Practical Homomorphic MACs for Arithmetic CircuitsCatalano, D. / Fiore, D. et al. | 2013
- 353
-
Streaming Authenticated Data StructuresPapamanthou, C. / Shi, E. / Tamassia, R. / Yi, K. et al. | 2013
- 371
-
Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key SettingDerbez, P. / Fouque, P.-A. / Jean, J. et al. | 2013
- 388
-
New Links between Differential and Linear CryptanalysisBlondeau, C. / Nyberg, K. et al. | 2013
- 405
-
Towards Key-Length Extension with Optimal Security: Cascade Encryption and Xor-cascade EncryptionLee, J. et al. | 2013
- 426
-
Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash FunctionsBaecher, P. / Farshim, P. / Fischlin, M. / Stam, M. et al. | 2013
- 444
-
Limitations of the Meta-reduction Technique: The Case of Schnorr SignaturesFischlin, M. / Fleischhacker, N. et al. | 2013
- 461
-
Practical Signatures from Standard AssumptionsBohl, F. / Hofheinz, D. / Jager, T. / Koch, J. / Seo, J.H. / Striecks, C. et al. | 2013
- 486
-
Locally Computable UOWHF with Linear ShrinkageApplebaum, B. / Moses, Y. et al. | 2013
- 503
-
Amplification of Chosen-Ciphertext SecurityLin, H. / Tessaro, S. et al. | 2013
- 520
-
Circular Chosen-Ciphertext Security with Compact CiphertextsHofheinz, D. et al. | 2013
- 537
-
MiniLEGO: Efficient Secure Two-Party Computation from General AssumptionsFrederiksen, T.K. / Jakobsen, T.P. / Nielsen, J.B. / Nordholt, P.S. / Orlandi, C. et al. | 2013
- 557
-
How to Hide Circuits in MPC an Efficient Framework for Private Function EvaluationMohassel, P. / Sadeghian, S. et al. | 2013
- 575
-
Multi-party Computation of Polynomials and Branching Programs without Simultaneous InteractionGordon, S.D. / Malkin, T. / Rosulek, M. / Wee, H. et al. | 2013
- 592
-
Quantum-Secure Message Authentication CodesBoneh, D. / Zhandry, M. et al. | 2013
- 609
-
One-Sided Device-Independent QKD and Position-Based Cryptography from Monogamy GamesTomamichel, M. / Fehr, S. / Kaniewski, J. / Wehner, S. et al. | 2013
- 626
-
Quadratic Span Programs and Succinct NIZKs without PCPsGennaro, R. / Gentry, C. / Parno, B. / Raykova, M. et al. | 2013
- 646
-
Zero-Knowledge Argument for Polynomial Evaluation with Application to BlacklistsBayer, S. / Groth, J. et al. | 2013
- 664
-
Resource-Restricted IndifferentiabilityDemay, G. / Gazi, P. / Hirt, M. / Maurer, U. et al. | 2013
- 684
-
On Concurrently Secure Computation in the Multiple Ideal Query ModelGoyal, V. / Jain, A. et al. | 2013
- 702
-
Universally Composable Secure Computation with (Malicious) Physically Uncloneable FunctionsOstrovsky, R. / Scafuro, A. / Visconti, I. / Wadia, A. et al. | 2013
- 719
-
How to Garble RAM Programs?Lu, S. / Ostrovsky, R. et al. | 2013