메뉴 건너뛰기




Volumn , Issue , 2012, Pages 189-200

Efficient lookup-table protocol in secure multiparty computation

Author keywords

cloud; edsl; haskell; secure multiparty computation

Indexed keywords

ADVANCED ENCRYPTION STANDARD ALGORITHMS; BOOLEAN CIRCUIT; COMPUTATION OVERHEADS; EDSL; GENERAL PURPOSE; HASKELL; LOOK UP TABLE; PARALLELIZATIONS; SECURE MULTI-PARTY COMPUTATION;

EID: 84867553703     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2364527.2364556     Document Type: Conference Paper
Times cited : (22)

References (16)
  • 1
    • 3042644992 scopus 로고    scopus 로고
    • Available at
    • National Institute of Standards and Technology (NIST). FIPS 197: Advanced encryption standard, 2001. Available at http://csrc.nist.gov/publications/fips/ fips197/fips-197.pdf.
    • (2001) FIPS 197: Advanced Encryption Standard
  • 3
    • 57049188348 scopus 로고    scopus 로고
    • Sharemind: A framework for fast privacy-preserving computations
    • Proceedings of 13th European Symposium on Research in Computer Security, ESORICS 2008 Springer-Verlag
    • D. Bogdanov, S. Laur, J.Willemson. Sharemind: a framework for fast privacy-preserving computations. In Proceedings of 13th European Symposium on Research in Computer Security, ESORICS 2008, LNCS, vol. 5283. Springer-Verlag, 2008.
    • (2008) LNCS , vol.5283
    • Bogdanov, D.1    Laur, S.2    Willemson, J.3
  • 5
    • 77953904148 scopus 로고    scopus 로고
    • Recommendation for Random Number Generation Using Deterministic Random Bit Generators
    • E. Barker and J. Kelsey. Recommendation for Random Number Generation Using Deterministic Random Bit Generators. NIST Special Publication 800-90A. http://csrc.nist.gov/publications/nistpubs/800-90A/SP800-90A.pdf
    • NIST Special Publication 800-90A
    • Barker, E.1    Kelsey, J.2
  • 7
    • 84867487588 scopus 로고    scopus 로고
    • Secure Multiparty AES, Financial Cryptography and Data Security
    • R. Sion (ed) Springer-Verlag
    • I. Damgaard and M. Keller, Secure Multiparty AES, Financial Cryptography and Data Security, R. Sion (ed), LNCS Vol. 6052, Springer-Verlag 2010.
    • (2010) LNCS , vol.6052
    • Damgaard, I.1    Keller, M.2
  • 8
    • 33745945277 scopus 로고    scopus 로고
    • Cryptographic Hardware and Embedded Systems (CHES 2001)
    • Two Methods of Rijndael Implementation in Reconfigurable Hardware Spring-Verlag
    • Two Methods of Rijndael Implementation in Reconfigurable Hardware, V. Fischer and M. Drutarovsk. Cryptographic Hardware and Embedded Systems (CHES 2001). LNCS Vol. 2162. Spring-Verlag 2001.
    • (2001) LNCS , vol.2162
    • Fischer, V.1    Drutarovsk, M.2
  • 10
    • 84867505290 scopus 로고    scopus 로고
    • Implementing Gentrys fullyhomomorphic encryption scheme. Advances in Cryptology (Eurocrypt 2011)
    • Springer-Verlag
    • C. Gentry and S. Halevi. Implementing Gentrys fullyhomomorphic encryption scheme. Advances in Cryptology (Eurocrypt 2011), LNCS Voli. 6632, Springer-Verlag, 2011.
    • (2011) LNCS , vol.6632
    • Gentry, C.1    Halevi, S.2
  • 11
    • 78649820323 scopus 로고    scopus 로고
    • Basic Applications
    • Cambridge University Press
    • O. Goldreich, Foundations of Cryptography, Vol 2: Basic Applications. Cambridge University Press, 2004.
    • (2004) Foundations of Cryptography , vol.2
    • Goldreich, O.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.