MPC-Friendly Symmetric Key Primitives
暂无分享,去创建一个
Dragos Rotaru | Nigel P. Smart | Peter Scholl | Christian Rechberger | Lorenzo Grassi | N. Smart | Dragos Rotaru | Peter Scholl | Christian Rechberger | Lorenzo Grassi
[1] Octavian Catrina,et al. Secure Multiparty Linear Programming Using Fixed-Point Arithmetic , 2010, ESORICS.
[2] Virginie Lallemand,et al. Cryptanalysis of the FLIP Family of Stream Ciphers , 2016, CRYPTO.
[3] Octavian Catrina,et al. Improved Primitives for Secure Multiparty Integer Computation , 2010, SCN.
[4] Octavian Catrina,et al. Secure Computation with Fixed-Point Numbers , 2010, Financial Cryptography.
[5] Judit Bar-Ilan,et al. Non-cryptographic fault-tolerant computing in constant number of rounds of interaction , 1989, PODC '89.
[6] Lars R. Knudsen,et al. The Interpolation Attack on Block Ciphers , 1997, FSE.
[7] Frederik Vercauteren,et al. The Hidden Root Problem , 2008, Pairing.
[8] Riivo Talviste,et al. From Oblivious AES to Efficient and Secure Database Join in the Multiparty Setting , 2013, ACNS.
[9] David J. Wu,et al. Practical Order-Revealing Encryption with Limited Leakage , 2016, FSE.
[10] Marcel Keller,et al. Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol , 2012, SCN.
[11] Anne Canteaut,et al. PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract , 2012, ASIACRYPT.
[12] Nathan Chenette,et al. Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions , 2011, CRYPTO.
[13] Wim van Dam,et al. Quantum Algorithms for Weighing Matrices and Quadratic Residues , 2000, Algorithmica.
[14] Sean Hallgren,et al. Quantum algorithms for some hidden shift problems , 2003, SODA '03.
[15] Ivan Damgård,et al. Asynchronous Multiparty Computation: Theory and Implementation , 2008, IACR Cryptol. ePrint Arch..
[16] Martin R. Albrecht,et al. MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity , 2016, ASIACRYPT.
[17] Anne Canteaut,et al. Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression , 2016, Journal of Cryptology.
[18] Yehuda Lindell,et al. Blazing Fast 2PC in the Offline/Online Setting with Security for Malicious Adversaries , 2015, IACR Cryptol. ePrint Arch..
[19] Chae Hoon Lim,et al. mCrypton - A Lightweight Block Cipher for Security of Low-Cost RFID Tags and Sensors , 2005, WISA.
[20] Hugo Krawczyk,et al. Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries , 2013, IACR Cryptol. ePrint Arch..
[21] Marcel Keller,et al. Secure Multiparty AES , 2010, Financial Cryptography.
[22] I. Damglurd. Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation , 2006 .
[23] Benny Pinkas,et al. Secure Two-Party Computation is Practical , 2009, IACR Cryptol. ePrint Arch..
[24] Martin R. Albrecht,et al. Ciphers for MPC and FHE , 2015, IACR Cryptol. ePrint Arch..
[25] Ivan Damgård,et al. Fast Oblivious AES A Dedicated Application of the MiniMac Protocol , 2016, AFRICACRYPT.
[26] Moni Naor,et al. Number-theoretic constructions of efficient pseudo-random functions , 2004, JACM.
[27] Lars R. Knudsen,et al. Provable security against a differential attack , 1994, Journal of Cryptology.
[28] Marcel Keller,et al. MASCOT: Faster Malicious Arithmetic Secure Computation with Oblivious Transfer , 2016, IACR Cryptol. ePrint Arch..
[29] Igor E. Shparlinski,et al. On the Hidden Shifted Power Problem , 2011, SIAM J. Comput..
[30] Marcel Keller,et al. A Unified Approach to MPC with Preprocessing using OT , 2015, IACR Cryptol. ePrint Arch..
[31] Claudio Orlandi,et al. A New Approach to Practical Active-Secure Two-Party Computation , 2012, IACR Cryptol. ePrint Arch..
[32] Ivan Damgård,et al. Secure Multiparty Computation Goes Live , 2009, Financial Cryptography.
[33] Alexander Russell,et al. Classical and Quantum Polynomial Reconstruction via Legendre Symbol Evaluation , 2002 .
[34] Ivan Damgård,et al. On the Randomness of Legendre and Jacobi Sequences , 1990, CRYPTO.
[35] Marcel Keller,et al. An architecture for practical actively secure MPC with dishonest majority , 2013, IACR Cryptol. ePrint Arch..
[36] Ivan Damgård,et al. Semi-Homomorphic Encryption and Multiparty Computation , 2011, IACR Cryptol. ePrint Arch..
[37] Ivan Damgård,et al. Multiparty Computation from Somewhat Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..
[38] Mihir Bellare,et al. Deterministic and Efficiently Searchable Encryption , 2007, CRYPTO.
[39] Gregory V. Bard,et al. Algorithm 898: Efficient multiplication of dense matrices over GF(2) , 2010, TOMS.
[40] Mark Zhandry,et al. Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation , 2015, EUROCRYPT.
[41] Alexander Russell,et al. Classical and quantum function reconstruction via character evaluation , 2004, J. Complex..
[42] Marcel Keller,et al. Practical Covertly Secure MPC for Dishonest Majority - Or: Breaking the SPDZ Limits , 2013, ESORICS.
[43] Claude Carlet,et al. Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts , 2016, EUROCRYPT.
[44] Rafail Ostrovsky,et al. Distributed Oblivious RAM for Secure Two-Party Computation , 2013, TCC.
[45] Gregory V. Bard,et al. Efficient Multiplication of Dense Matrices over GF(2) , 2008, ArXiv.