×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [honest parties]
Dov Gordon & Jonathan Katz University of Maryland
225 views
Minimalism in Cryptography: The Even-Mansour Scheme Revisited Orr Dunkelman, Nathan Keller, and Adi Shamir Haifa University, Bar-Ilan University, and The
216 views
QCRYPT 2011, Zurich, September 2011 Lluis Masanes 1, Stefano Pironio 2 and Antonio Acín 1,3 1 ICFO-Institut de Ciencies Fotoniques, Barcelona 2 Université
214 views
Privacy Preservation Issues in Association Rule Mining in Horizontally Partitioned Databases
744 views
Proactive moderation
536 views
Presenter: Cheng Li. MPC Secure Multiparty Computation Protocol: Group of mutually distrusting parties to compute a joint function f on their private
214 views
Survey: Secure Composition of Multiparty Protocols Yehuda Lindell IBM T.J. Watson
216 views
1. 2 Key Exchange Protocols A protocol between two parties to establish a shared key ( “ session key ” ) such that: 1. Authenticity: they both know who
240 views
Mario Čagalj University of Split 2013/2014. FELK 19: Security of Wireless Networks
225 views
Cryptography Lecture 3 Arpita Patra. Quick Recall and Today’s Roadmap >> Construction based on PRG >> Overview of Proof by reduction >> Proof of PRG-based
222 views
How to Use Bitcoin to Enhance Secure Computation Ranjit Kumaresan (MIT) Based on joint works with Iddo Bentov (Technion), Tal Moran (IDC), Guy Zyskind
225 views
Scaling Secure Computation Using the Cloud Payman Mohassel Yahoo Labs 1
221 views
Next >