<--- Back to Details
First PageDocument Content
Electronic engineering / Digital electronics / Electronics / Electronic design automation / Electronic design / Logic in computer science / Cryptographic protocols / Garbled circuit / Boolean circuit / Sequential logic / Logic synthesis / Standard cell
Date: 2015-05-11 16:43:20
Electronic engineering
Digital electronics
Electronics
Electronic design automation
Electronic design
Logic in computer science
Cryptographic protocols
Garbled circuit
Boolean circuit
Sequential logic
Logic synthesis
Standard cell

2015 IEEE Symposium on Security and Privacy TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits Ebrahim M. Songhori∗ , Siam U. Hussain∗ , Ahmad-Reza Sadeghi† , Thomas Schneider† , Farinaz Kous

Add to Reading List

Source URL: www.ieee-security.org

Download Document from Source Website

File Size: 485,75 KB

Share Document on Facebook

Similar Documents

On the Robustness of some Cryptographic Protocols for Mobile Agent Protection Volker Roth Fraunhofer Institut f¨ur Graphische Datenverarbeitung Rundeturmstraße 6, 64283 Darmstadt, Germany

On the Robustness of some Cryptographic Protocols for Mobile Agent Protection Volker Roth Fraunhofer Institut f¨ur Graphische Datenverarbeitung Rundeturmstraße 6, 64283 Darmstadt, Germany

DocID: 1uZJK - View Document

Verifying Cryptographic Protocols in Applied Pi Calculus Mark Ryan Ben Smyth

Verifying Cryptographic Protocols in Applied Pi Calculus Mark Ryan Ben Smyth

DocID: 1uXvn - View Document

Secure Cryptographic Protocols for E-commerce Transaction  on the Internet

Secure Cryptographic Protocols for E-commerce Transaction on the Internet

DocID: 1uDkO - View Document

Type-Based Automated Verification of Authenticity in Cryptographic Protocols Daisuke Kikuchi and Naoki Kobayashi Graduate School of Information Sciences, Tohoku University {kikuchi,koba}@kb.ecei.tohoku.ac.jp

Type-Based Automated Verification of Authenticity in Cryptographic Protocols Daisuke Kikuchi and Naoki Kobayashi Graduate School of Information Sciences, Tohoku University {kikuchi,koba}@kb.ecei.tohoku.ac.jp

DocID: 1u5Us - View Document

Cryptographic schemes  Protocols Specifications of primitives

Cryptographic schemes Protocols Specifications of primitives

DocID: 1u4P2 - View Document