<--- Back to Details
First PageDocument Content
Cryptography / Secure multi-party computation / Authenticated encryption / Ciphertext indistinguishability / Public-key cryptography / Cryptographic protocol / Encryption / Digital signature / Standard model / Key / Advantage
Date: 2017-11-10 07:57:54
Cryptography
Secure multi-party computation
Authenticated encryption
Ciphertext indistinguishability
Public-key cryptography
Cryptographic protocol
Encryption
Digital signature
Standard model
Key
Advantage

Fairness in an Unfair World: Fair Multiparty Computation from public Bulletin Boards Arka Rai Choudhuri Johns Hopkins University Matthew Green

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 561,05 KB

Share Document on Facebook

Similar Documents

Authenticated Encryption Schemes and Cryptanalysis Jérémy Jean Laboratoire Crypto Agence Nationale de la Sécurité des Systèmes d’Information  26 avril 2017

Authenticated Encryption Schemes and Cryptanalysis Jérémy Jean Laboratoire Crypto Agence Nationale de la Sécurité des Systèmes d’Information 26 avril 2017

DocID: 1vmql - View Document

Workshop on Real-World Cryptography Stanford University Jan. 9-11, 2013 AES-GCM for Efficient Authenticated Encryption – Ending the Reign of HMAC-SHA-1? Shay Gueron

Workshop on Real-World Cryptography Stanford University Jan. 9-11, 2013 AES-GCM for Efficient Authenticated Encryption – Ending the Reign of HMAC-SHA-1? Shay Gueron

DocID: 1uVDI - View Document

Building a battlefield for authenticated encryption D. J. Bernstein University of Illinois at Chicago  Krovetz–Rogaway, tomorrow:

Building a battlefield for authenticated encryption D. J. Bernstein University of Illinois at Chicago Krovetz–Rogaway, tomorrow:

DocID: 1uzgg - View Document

Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption Philipp Jovanovic SPEED-B October 20, 2016

Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption Philipp Jovanovic SPEED-B October 20, 2016

DocID: 1uv45 - View Document

Authenticated encryption  Lecturers: Mark D. Ryan and David Galindo. CryptographySlide: 136

Authenticated encryption Lecturers: Mark D. Ryan and David Galindo. CryptographySlide: 136

DocID: 1uqxV - View Document