... Oblivious transfer based on the mceliece assumptions . IEICE Transactions on Fundamentals of Electronics ... Efficient and universally composable committed oblivious transfer and applications . In : Naor , M. ( ed . ) TCC 2004 ...
... oblivious transfer and pri- vate multi - party computation . In : Coppersmith , D. ( ed . ) CRYPTO 1995. LNCS , vol ... McEliece assumptions . In : Smith , A. ( ed . ) ICITS 2012. LNCS , vol . 7412 , pp . 80–99 . Springer ...
... oblivious transfer from lossy encryption and the McEliece assump- tions . In : Smith , A. ( ed . ) ICITS 2012. LNCS ... fully secure two - round isogeny - based OT . In : Krenn , S. , Shulman , H. , Vaudenay , S. ( eds . ) CANS ...
This book constitutes the refereed proceedings of the 9th International Workshop on Post-Quantum Cryptography, PQCrypto 2018, held in Fort Lauderdale, FL, USA, in April 2018.
This book constitutes the refereed proceedings of the 19th International Conference on Cryptology and Network Security, CANS 2020, held in Vienna, Austria, in December 2020.* The 30 full papers were carefully reviewed and selected from 118 ...
This book constitutes the refereed proceedings of the 26th Australasian Conference on Information Security and Privacy, ACISP 2021, held in Perth, WA, Australia, in November 2021.
This Festschrift volume contains the proceedings of the conference Mathematical Methods in Computer Science, MMICS 2008, held December 2008, in Karlsruhe, Germany, in memory of Thomas Beth.
This book will allow developers to: Develop a solid basis in the theory of cryptography, so they can understand how the security tools in the .NET Framework function Learn to use symmetric algorithms, asymmetric algorithms, and digital ...
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2009, CT-RSA 2009, held in San Francisco, CA, USA in April 2009.