Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
28
views
35
references
Top references
cited by
0
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,458
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology – EUROCRYPT 2021 : 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17–21, 2021, Proceedings, Part II
Breaking the Circuit Size Barrier for Secure Computation Under Quasi-Polynomial LPN
other
Author(s):
Geoffroy Couteau
,
Pierre Meyer
Publication date
(Online):
June 16 2021
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Open Access Publishing Practices
Most cited references
35
Record
: found
Abstract
: not found
Conference Proceedings
: not found
How to generate and exchange secrets
Andrew Yao
(1986)
0
comments
Cited
309
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Fully homomorphic encryption using ideal lattices
Craig Gentry
(2009)
0
comments
Cited
163
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
How to play ANY mental game
O Goldreich
,
S Micali
,
A. Wigderson
(1987)
0
comments
Cited
136
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2021
Publication date (Online):
June 16 2021
Pages
: 842-870
DOI:
10.1007/978-3-030-77886-6_29
SO-VID:
d767a681-a792-4580-913d-138a6aa85ff0
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields
pp. 35
Mind the Middle Layer: The HADES Design Strategy Revisited
pp. 64
Password Hashing and Preprocessing
pp. 92
Compactness of Hashing Modes and Efficiency Beyond Merkle Tree
pp. 127
Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3
pp. 155
Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2
pp. 187
Pre-computation Scheme of Window \(\tau \)NAF for Koblitz Curves Revisited
pp. 219
Dummy Shuffling Against Algebraic Attacks in White-Box Implementations
pp. 249
Advanced Lattice Sieving on GPUs, with Tensor Cores
pp. 283
Fast Verification of Masking Schemes in Characteristic Two
pp. 313
On the Power of Expansion: More Efficient Constructions in the Random Probing Model
pp. 344
Leakage-Resilience of the Shamir Secret-Sharing Scheme Against Physical-Bit Leakages
pp. 377
Leakage Resilient Value Comparison with Application to Message Authentication
pp. 408
The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free
pp. 438
Message-Recovery Laser Fault Injection Attack on the Classic McEliece Cryptosystem
pp. 468
Multi-source Non-malleable Extractors and Applications
pp. 501
Secure Software Leasing
pp. 531
Oblivious Transfer Is in MiniQCrypt
pp. 562
Security Analysis of Quantum Lightning
pp. 568
Classical vs Quantum Random Oracles
pp. 598
On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs of Sequential Work
pp. 630
Classical Proofs of Quantum Knowledge
pp. 663
Order-C Secure Multiparty Computation for Highly Repetitive Circuits
pp. 694
The More the Merrier: Reducing the Cost of Large Scale MPC
pp. 724
Multiparty Reusable Non-interactive Secure Computation from LWE
pp. 754
Unbounded Multi-party Computation from Learning with Errors
pp. 782
Generic Compiler for Publicly Verifiable Covert Multi-Party Computation
pp. 812
Constant-Overhead Unconditionally Secure Multiparty Computation Over Binary Fields
pp. 842
Breaking the Circuit Size Barrier for Secure Computation Under Quasi-Polynomial LPN
pp. 871
Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation
pp. 901
VOLE-PSI: Fast OPRF and Circuit-PSI from Vector-OLE
Similar content
1,458
916: Laparoscopic Partial Nephrectomy (LPN) for Hilar Tumors: Evaluation of Short - Term Oncological Outcome
Authors:
Louis R. Kavoussi
,
Lee Richstone
,
Michael C Ost
…
Report of findings from the 2018 LPN/VN nursing knowledge survey
Authors:
National Council of State Boards of Nursing
P.118 Plasma taurine levels and short bowel syndrome (SBS) undergoing long-term parenteral nutrition (LPN)
Authors:
F Iglicki
,
P Crenn
,
C Coudray-Lucas
…
See all similar