Back to Results
First PageMeta Content
Silvio Micali / Verifiable secret sharing / Secure multi-party computation / Zero-knowledge proof / Index of cryptography articles / Noisy-storage model / Cryptography / Cryptographic protocols / Oblivious transfer


Cryptography and Mechanism Design M o n i Naor* Dept. of Computer Science and Applied Math
Add to Reading List

Document Date: 2011-10-23 10:31:50


Open Document

File Size: 296,11 KB

Share Result on Facebook

Company

IBM / Princeton University Press / AES / Aiken Computation Laboratory / /

Country

Israel / /

Event

FDA Phase / /

Facility

IBM Almaden Research Center / Applied Math Weizmann Institute of Science Rehovot / Stanford University / Cryptography Library / /

IndustryTerm

secure function protocol / cryptographic tools / secure function evaluation protocols / insecure protocol / above applications / communication systems / e - commerce / secure evaluation protocol / Internet environment / /

Organization

Computer Science and Applied Math Weizmann Institute of Science Rehovot / Stanford University / Princeton University / Secure / /

Person

Verifiable Secret Sharing / T. Rabin / M. Ben-Or / Multiparty Protocols / /

Product

Signing Contracts / ACM Syrup / /

PublishedMedium

Journal of Finance / Communications of the ACM / Theory of Computing / /

SportsLeague

Stanford University / /

Technology

Cryptography / secure function protocol / prescribed protocol / following two-party protocol / secure function evaluation protocols / secure evaluation protocol / block cipher / insecure protocol / secret key / Simulation / resulting protocol / /

SocialTag