Amanote Research
Register
Sign In
Secure Equality Testing Protocols in the Two-Party Setting
doi 10.1145/3230833.3230866
Full Text
Open PDF
Abstract
Available in
full text
Date
January 1, 2018
Authors
Majid Nateghizad
Thijs Veugen
Zekeriya Erkin
Reginald L. Lagendijk
Publisher
ACM Press
Related search
Hiding the Input-Size in Secure Two-Party Computation
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Efficiently Making Secure Two-Party Computation Fair
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Secure Two-Party Computation Over Unreliable Channels
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Certificateless Authenticated Two-Party Key Agreement Protocols
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Towards Characterizing Complete Fairness in Secure Two-Party Computation
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Faster Secure Two-Party Computation With Less Memory
Efficient Secure Two-Party Computation Against Malicious Adversaries
Fast and Maliciously Secure Two-Party Computation Using the GPU
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Higher-Order Glitches Free Implementation of the AES Using Secure Multi-Party Computation Protocols
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science