Amanote Research

Amanote Research

    RegisterSign In

Secure Equality Testing Protocols in the Two-Party Setting

doi 10.1145/3230833.3230866
Full Text
Open PDF
Abstract

Available in full text

Date

January 1, 2018

Authors
Majid NateghizadThijs VeugenZekeriya ErkinReginald L. Lagendijk
Publisher

ACM Press


Related search

Hiding the Input-Size in Secure Two-Party Computation

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2013English

Efficiently Making Secure Two-Party Computation Fair

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2017English

Secure Two-Party Computation Over Unreliable Channels

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2018English

Certificateless Authenticated Two-Party Key Agreement Protocols

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2007English

Towards Characterizing Complete Fairness in Secure Two-Party Computation

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2014English

Faster Secure Two-Party Computation With Less Memory

2013English

Efficient Secure Two-Party Computation Against Malicious Adversaries

English

Fast and Maliciously Secure Two-Party Computation Using the GPU

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2013English

Higher-Order Glitches Free Implementation of the AES Using Secure Multi-Party Computation Protocols

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2011English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy