-
1
-
-
3042644992
-
-
Available at
-
National Institute of Standards and Technology (NIST). FIPS 197: Advanced encryption standard, 2001. Available at http://csrc.nist.gov/publications/fips/ fips197/fips-197.pdf.
-
(2001)
FIPS 197: Advanced Encryption Standard
-
-
-
3
-
-
57049188348
-
Sharemind: A framework for fast privacy-preserving computations
-
Proceedings of 13th European Symposium on Research in Computer Security, ESORICS 2008 Springer-Verlag
-
D. Bogdanov, S. Laur, J.Willemson. Sharemind: a framework for fast privacy-preserving computations. In Proceedings of 13th European Symposium on Research in Computer Security, ESORICS 2008, LNCS, vol. 5283. Springer-Verlag, 2008.
-
(2008)
LNCS
, vol.5283
-
-
Bogdanov, D.1
Laur, S.2
Willemson, J.3
-
4
-
-
70350379222
-
Secure Multiparty Computation Goes Live. Financial Cryptography and Data Security
-
R. Dingledine and P. Golle (eds) Springer-Verlag
-
P. Bogetoft, D. L. Christensen, I. Damgaard, M. Geisler, T. Jakobsen, M. Kroeigaard, J. D. Nielsen, J. B. Nielsen, K. Nielsen, J. Pagter, M. Schwartzbach, and T. Toft, Secure Multiparty Computation Goes Live. Financial Cryptography and Data Security, R. Dingledine and P. Golle (eds), LNCS Vol. 5628, Springer-Verlag 2009.
-
(2009)
LNCS
, vol.5628
-
-
Bogetoft, P.1
Christensen, D.L.2
Damgaard, I.3
Geisler, M.4
Jakobsen, T.5
Kroeigaard, M.6
Nielsen, J.D.7
Nielsen, J.B.8
Nielsen, K.9
Pagter, J.10
Schwartzbach, M.11
Toft, T.12
-
5
-
-
77953904148
-
Recommendation for Random Number Generation Using Deterministic Random Bit Generators
-
E. Barker and J. Kelsey. Recommendation for Random Number Generation Using Deterministic Random Bit Generators. NIST Special Publication 800-90A. http://csrc.nist.gov/publications/nistpubs/800-90A/SP800-90A.pdf
-
NIST Special Publication 800-90A
-
-
Barker, E.1
Kelsey, J.2
-
7
-
-
84867487588
-
Secure Multiparty AES, Financial Cryptography and Data Security
-
R. Sion (ed) Springer-Verlag
-
I. Damgaard and M. Keller, Secure Multiparty AES, Financial Cryptography and Data Security, R. Sion (ed), LNCS Vol. 6052, Springer-Verlag 2010.
-
(2010)
LNCS
, vol.6052
-
-
Damgaard, I.1
Keller, M.2
-
8
-
-
33745945277
-
Cryptographic Hardware and Embedded Systems (CHES 2001)
-
Two Methods of Rijndael Implementation in Reconfigurable Hardware Spring-Verlag
-
Two Methods of Rijndael Implementation in Reconfigurable Hardware, V. Fischer and M. Drutarovsk. Cryptographic Hardware and Embedded Systems (CHES 2001). LNCS Vol. 2162. Spring-Verlag 2001.
-
(2001)
LNCS
, vol.2162
-
-
Fischer, V.1
Drutarovsk, M.2
-
10
-
-
84867505290
-
Implementing Gentrys fullyhomomorphic encryption scheme. Advances in Cryptology (Eurocrypt 2011)
-
Springer-Verlag
-
C. Gentry and S. Halevi. Implementing Gentrys fullyhomomorphic encryption scheme. Advances in Cryptology (Eurocrypt 2011), LNCS Voli. 6632, Springer-Verlag, 2011.
-
(2011)
LNCS
, vol.6632
-
-
Gentry, C.1
Halevi, S.2
-
11
-
-
78649820323
-
Basic Applications
-
Cambridge University Press
-
O. Goldreich, Foundations of Cryptography, Vol 2: Basic Applications. Cambridge University Press, 2004.
-
(2004)
Foundations of Cryptography
, vol.2
-
-
Goldreich, O.1
-
12
-
-
84914127581
-
Faster Secure Two-Party Computation Using Garbled Circuits
-
Y. Huang. D. Evans, J. Katz, L. Malka, Faster Secure Two-Party Computation Using Garbled Circuits. In 20th USENIX Security Symposium, San Francisco, 2011.
-
20th USENIX Security Symposium, San Francisco, 2011
-
-
Huang, Y.1
Evans, D.2
Katz, J.3
Malka, L.4
-
13
-
-
85084163840
-
FairPlay - A secure two party computation system
-
D. Malkhi, N. Nisan, B. Pinkas, and Y. Sella, FairPlay - a secure two party computation system. Proceedings of the 13th conference on USENIX Security Symposium - Vol. 13, 2004.
-
(2004)
Proceedings of the 13th Conference on USENIX Security Symposium
, vol.13
-
-
Malkhi, D.1
Nisan, N.2
Pinkas, B.3
Sella, Y.4
|