메뉴 건너뛰기




Volumn 6052 LNCS, Issue , 2010, Pages 367-374

Secure multiparty AES

Author keywords

[No Author keywords available]

Indexed keywords

AES ENCRYPTION; ELEMENTARY OPERATIONS; LOCAL NETWORKS; OPTIMIZED IMPLEMENTATION; SECURE MULTI-PARTY COMPUTATION; SOFTWARE FRAMEWORKS;

EID: 77955317678     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-14577-3_31     Document Type: Conference Paper
Times cited : (35)

References (13)
  • 1
    • 84898960610 scopus 로고
    • Completeness theorems for noncryptographic fault-tolerant distributed computation (extended abstract)
    • ACM, New York
    • Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for noncryptographic fault-tolerant distributed computation (extended abstract). In: STOC, pp. 1-10. ACM, New York (1988)
    • (1988) STOC , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 2
    • 57049188348 scopus 로고    scopus 로고
    • Sharemind: A framework for fast privacypreserving computations
    • Jajodia, S., Lopez, J. (eds.) Springer, Heidelberg, ESORICS 2008
    • Bogdanov, D., Laur, S., Willemson, J.: Sharemind: A framework for fast privacypreserving computations. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol.5283, pp. 192-206. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5283 , pp. 192-206
    • Bogdanov, D.1    Laur, S.2    Willemson, J.3
  • 4
    • 84898947315 scopus 로고
    • Multiparty unconditionally secure protocols (extended abstract)
    • ACM, New York
    • Chaum, D., Cŕepeau, C., Damgard, I.: Multiparty unconditionally secure protocols (extended abstract). In: STOC, pp. 11-19. ACM, New York (1988)
    • (1988) STOC , pp. 11-19
    • Chaum, D.1    Cŕepeau, C.2    Damgard, I.3
  • 5
    • 21144458613 scopus 로고    scopus 로고
    • Share conversion, pseudorandom secret-sharing and applications to secure computation
    • Kilian, J. (ed.) Springer, Heidelberg, TCC 2005
    • Cramer, R., Damgard, I., Ishai, Y.: Share conversion, pseudorandom secret-sharing and applications to secure computation. In: Kilian, J. (ed.) TCC 2005. LNCS, vol.3378, pp. 342-362. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3378 , pp. 342-362
    • Cramer, R.1    Damgard, I.2    Ishai, Y.3
  • 6
    • 67049134126 scopus 로고    scopus 로고
    • Asynchronous multiparty computation: Theory and implementation
    • Jarecki, S., Tsudik, G. (eds.) Springer, Heidelberg, PKC 2009
    • Damgard, I., Geisler, M., Krøigaard, M., Nielsen, J.B.: Asynchronous multiparty computation: Theory and implementation. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol.5443, pp. 160-179. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5443 , pp. 160-179
    • Damgard, I.1    Geisler, M.2    Krøigaard, M.3    Nielsen, J.B.4
  • 8
    • 77955332220 scopus 로고    scopus 로고
    • VIFF: Virtual ideal functionality framework
    • Geisler, M.: VIFF: Virtual ideal functionality framework. Homepage (2007), http://viff.dk/
    • (2007) Homepage
    • Geisler, M.1
  • 11
    • 0003508558 scopus 로고    scopus 로고
    • Advanced encryption standard
    • FIPS Publications. National Institute of Standards and Technology (November)
    • FIPS Publications. Advanced Encryption Standard. Technical Report FIPS PUB 197, National Institute of Standards and Technology (November 2001)
    • (2001) Technical Report FIPS PUB 197
  • 12
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir, A.: How to share a secret. ACM Commun. 22(11), 612-613 (1979)
    • (1979) ACM Commun , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 13
    • 0022882770 scopus 로고
    • How to generate and exchange secrets (extended abstract)
    • IEEE, Los Alamitos
    • Yao, A.C.-C.: How to generate and exchange secrets (extended abstract). In: FOCS, pp. 162-167. IEEE, Los Alamitos (1986)
    • (1986) FOCS , pp. 162-167
    • Yao, A.C.-C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.