Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 1418291 - MaRDI portal

scientific article; zbMATH DE number 1418291

From MaRDI portal
Publication:4941851

zbMath0940.94011MaRDI QIDQ4941851

Niv Gilboa

Publication date: 19 March 2000


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (23)

Threshold Schnorr with stateless deterministic signing from standard assumptionsEfficient RSA Key Generation and Threshold Paillier in the Two-Party SettingHighly efficient OT-based multiplication protocolsOn the Security of Distributed Multiprime RSAActively secure arithmetic computation and VOLE with constant computational overheadEfficient RSA key generation and threshold Paillier in the two-party settingThreshold linearly homomorphic encryption on \(\mathrm{Z}/2^k\mathrm{Z}\)MyOPE: malicious security for oblivious polynomial evaluationNon-interactive secure computation of inner-product from LPN and LWEAttaining GOD beyond honest majority with friends and foesTwo-round MPC without round collapsing revisited -- towards efficient malicious protocolsTwo-round stateless deterministic two-party Schnorr signatures from pseudorandom correlation functionsCorrelated pseudorandomness from the hardness of quasi-abelian decodingImproved Multiplication Triple Generation over Rings via RLWE-Based AHEOblivious polynomial evaluation and secure set-intersection from algebraic PRFsScalable Multi-party Private Set-IntersectionMultiparty generation of an RSA modulusBandwidth-efficient threshold EC-DSAMon\(\mathbb{Z}_{2^k}\)a: fast maliciously secure two party computation on \(\mathbb{Z}_{2^k} \)VOLE-PSI: fast OPRF and circuit-PSI from vector-OLEOblivious polynomial evaluation and oblivious neural learningBandwidth-efficient threshold EC-DSA revisited: online/offline extensions, identifiable aborts proactive and adaptive securityMultiparty generation of an RSA modulus




This page was built for publication: