ROTed: Random Oblivious Transfer for embedded devices
暂无分享,去创建一个
P. Mateus | L. Sousa | P. Branco | L. Fiolhais | M. Goulão | P. Martins | L. Sousa | P. Mateus | L. Fiolhais | P. Martins | P. Branco | M. Goulão
[1] Silvio Micali,et al. A Completeness Theorem for Protocols with Honest Majority , 1987, STOC 1987.
[2] Claudio Orlandi,et al. The Simplest Protocol for Oblivious Transfer , 2015, IACR Cryptol. ePrint Arch..
[3] Julian Loss,et al. Efficient and Universally Composable Protocols for Oblivious Transfer from the CDH Assumption , 2017, IACR Cryptol. ePrint Arch..
[4] Oded Regev,et al. On lattices, learning with errors, random linear codes, and cryptography , 2005, STOC '05.
[5] Chris Peikert,et al. On Ideal Lattices and Learning with Errors over Rings , 2010, JACM.
[6] Tanja Lange,et al. High-speed high-security signatures , 2011, Journal of Cryptographic Engineering.
[7] Benny Pinkas,et al. PSI from PaXoS: Fast, Malicious Private Set Intersection , 2020, IACR Cryptol. ePrint Arch..
[8] Jakob Jonsson,et al. PKCS #1: RSA Cryptography Specifications Version 2.2 , 2016, RFC.
[9] Elaine B. Barker,et al. Recommendation for Random Number Generation Using Deterministic Random Bit Generators , 2007 .
[10] Benny Pinkas,et al. SpOT-Light: Lightweight Private Set Intersection from Sparse OT Extension , 2019, IACR Cryptol. ePrint Arch..
[11] Jintai Ding,et al. A Simple Provably Secure Key Exchange Scheme Based on the Learning with Errors Problem , 2012, IACR Cryptol. ePrint Arch..
[12] Moritz Schubotz,et al. A First Step Towards Content Protecting Plagiarism Detection , 2020, JCDL.
[13] Mark Zhandry,et al. Random Oracles in a Quantum World , 2010, ASIACRYPT.
[14] Jintai Ding,et al. A Framework for Universally Composable Oblivious Transfer from One-Round Key-Exchange , 2019, IACR Cryptol. ePrint Arch..
[15] Peter Rindal,et al. PIR-PSI: Scaling Private Contact Discovery , 2018, IACR Cryptol. ePrint Arch..
[16] Moti Yung,et al. On Deploying Secure Computing: Private Intersection-Sum-with-Cardinality , 2020, 2020 IEEE European Symposium on Security and Privacy (EuroS&P).
[17] Peter Rindal,et al. Endemic Oblivious Transfer , 2019, IACR Cryptol. ePrint Arch..
[18] Ran Canetti,et al. Blazing Fast OT for Three-Round UC OT Extension , 2020, IACR Cryptol. ePrint Arch..
[19] Andrew Chi-Chih Yao,et al. Protocols for Secure Computations (Extended Abstract) , 1982, FOCS.
[20] Vitaly Shmatikov,et al. Privacy-preserving remote diagnostics , 2007, CCS '07.
[21] Frederik Vercauteren,et al. Efficient software implementation of ring-LWE encryption , 2015, 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[22] Benny Pinkas,et al. Secure Two-Party Computation is Practical , 2009, IACR Cryptol. ePrint Arch..
[23] Phillipp Schoppmann,et al. Asymmetric Private Set Intersection with Applications to Contact Tracing and Private Vertical Federated Machine Learning , 2020, ArXiv.
[24] Paulo S. L. M. Barreto,et al. A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM , 2017, IACR Cryptol. ePrint Arch..
[25] Yuval Ishai,et al. Extending Oblivious Transfers Efficiently , 2003, CRYPTO.
[26] Leonel Sousa,et al. Software Emulation of Quantum Resistant Trusted Platform Modules , 2020, ICETE.
[27] Brent Waters,et al. A Framework for Efficient and Composable Oblivious Transfer , 2008, CRYPTO.
[28] Emmanuela Orsini,et al. TinyKeys: A New Approach to Efficient Multi-Party Computation , 2018, IACR Cryptol. ePrint Arch..
[29] David Cash,et al. Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems , 2009, CRYPTO.
[30] Emmanuela Orsini,et al. Actively Secure 1-out-of-N OT Extension with Application to Private Set Intersection , 2017, CT-RSA.
[31] Ran Canetti,et al. Universally Composable Commitments , 2001, CRYPTO.
[32] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.