HEM 发表于 2025-3-21 16:33:40

书目名称Engineering Secure Two-Party Computation Protocols影响因子(影响力)<br>        http://figure.impactfactor.cn/if/?ISSN=BK0310943<br><br>        <br><br>书目名称Engineering Secure Two-Party Computation Protocols影响因子(影响力)学科排名<br>        http://figure.impactfactor.cn/ifr/?ISSN=BK0310943<br><br>        <br><br>书目名称Engineering Secure Two-Party Computation Protocols网络公开度<br>        http://figure.impactfactor.cn/at/?ISSN=BK0310943<br><br>        <br><br>书目名称Engineering Secure Two-Party Computation Protocols网络公开度学科排名<br>        http://figure.impactfactor.cn/atr/?ISSN=BK0310943<br><br>        <br><br>书目名称Engineering Secure Two-Party Computation Protocols被引频次<br>        http://figure.impactfactor.cn/tc/?ISSN=BK0310943<br><br>        <br><br>书目名称Engineering Secure Two-Party Computation Protocols被引频次学科排名<br>        http://figure.impactfactor.cn/tcr/?ISSN=BK0310943<br><br>        <br><br>书目名称Engineering Secure Two-Party Computation Protocols年度引用<br>        http://figure.impactfactor.cn/ii/?ISSN=BK0310943<br><br>        <br><br>书目名称Engineering Secure Two-Party Computation Protocols年度引用学科排名<br>        http://figure.impactfactor.cn/iir/?ISSN=BK0310943<br><br>        <br><br>书目名称Engineering Secure Two-Party Computation Protocols读者反馈<br>        http://figure.impactfactor.cn/5y/?ISSN=BK0310943<br><br>        <br><br>书目名称Engineering Secure Two-Party Computation Protocols读者反馈学科排名<br>        http://figure.impactfactor.cn/5yr/?ISSN=BK0310943<br><br>        <br><br>

能够支付 发表于 2025-3-21 21:38:58

Book 2012n arbitrary function on their respective private inputs while revealing nothing but the result. Originally the technique was considered to be too inefficient for practical privacy-preserving applications, but in recent years rapid speed-up in computers and communication networks, algorithmic improve

FOLD 发表于 2025-3-22 03:58:49

cryptographic protocols for privacy-preserving real-world a.Secure two-party computation, called secure function evaluation (SFE), enables two mutually mistrusting parties, the client and server, to evaluate an arbitrary function on their respective private inputs while revealing nothing but the re

unstable-angina 发表于 2025-3-22 04:48:14

https://doi.org/10.1007/978-3-662-70201-7 how GCs can be evaluated efficiently in HW, and extend and evaluate the practicality of One-Time Programs (OTPs) for protecting against arbitrary side-channel attacks. As an application we show in Sect. 4.3 how a HW token can be used for secure outsourcing of data and arbitrary computations thereon in a cloud computing scenario.

混沌 发表于 2025-3-22 11:52:49

http://reply.papertrans.cn/32/3110/310943/310943_5.png

agenda 发表于 2025-3-22 16:39:52

Circuit Optimizations and Constructions,ient circuits for standard functionalities such as integer comparison. We also give efficient circuit constructions for computing minima (or maxima) and for fast multiplication. As applications we consider efficient protocols for secure comparison and first-price auctions in applications: secure comparison auctions.

agenda 发表于 2025-3-22 20:21:19

http://reply.papertrans.cn/32/3110/310943/310943_7.png

contradict 发表于 2025-3-22 23:55:19

http://reply.papertrans.cn/32/3110/310943/310943_8.png

不愿 发表于 2025-3-23 01:59:55

Engineering Secure Two-Party Computation Protocols978-3-642-30042-4

vocation 发表于 2025-3-23 09:07:00

uctions, hardware-assisted garbled circuit protocols, and the modular design of efficient SFE protocols. .The goal of the author‘s research is to use algorithm engineering methods to engineer efficient secure p978-3-642-30041-7978-3-642-30042-4
页: [1] 2 3 4
查看完整版本: Titlebook: Engineering Secure Two-Party Computation Protocols; Design, Optimization Thomas Schneider Book 2012 Springer-Verlag Berlin Heidelberg 2012