<--- Back to Details
First PageDocument Content
Cryptography / Circuit complexity / Trapdoor function / Data Encryption Standard / Circuit / Function / Secure multi-party computation
Date: 2013-06-30 14:22:04
Cryptography
Circuit complexity
Trapdoor function
Data Encryption Standard
Circuit
Function
Secure multi-party computation

The proceedings version of this paper appears in CCSThis is the full paper, an earlier version of which was circulated under the title “Garbling Schemes”. Foundations of Garbled Circuits Mihir Bellare1 1

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 400,87 KB

Share Document on Facebook

Similar Documents

International Journal of Computer Science and Software Engineering (IJCSSE), Volume 6, Issue 7, July 2017 ISSN (Online): www.IJCSSE.org Page: A Modified Simplified Data Encryption Standard Algorithm

International Journal of Computer Science and Software Engineering (IJCSSE), Volume 6, Issue 7, July 2017 ISSN (Online): www.IJCSSE.org Page: A Modified Simplified Data Encryption Standard Algorithm

DocID: 1uAKb - View Document

Differential Cryptanalysis of the Data Encryption Standard Eli Biham1 Adi Shamir2

Differential Cryptanalysis of the Data Encryption Standard Eli Biham1 Adi Shamir2

DocID: 1udaS - View Document

emale improving men’s  health  &  wellbeing issue 117 December 2012 grey is the new black at work boys hit by body blues

emale improving men’s  health  &  wellbeing issue 117 December 2012 grey is the new black at work boys hit by body blues

DocID: 1rs50 - View Document

Tidings TRINITY EPISCOPAL CHURCH 105 BRIDGE STREET · ELKTON, MARYLANDEMAIL:   Phone

Tidings TRINITY EPISCOPAL CHURCH 105 BRIDGE STREET · ELKTON, MARYLANDEMAIL: Phone

DocID: 1rpZf - View Document

Efficient Cache Attacks on AES, and Countermeasures Eran Tromer1 2 , Dag Arne Osvik3 and Adi Shamir2 1 Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology,

Efficient Cache Attacks on AES, and Countermeasures Eran Tromer1 2 , Dag Arne Osvik3 and Adi Shamir2 1 Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology,

DocID: 1rolT - View Document