Sciweavers

391 search results - page 39 / 79
» Secure Multiparty AES
Sort
View
IHI
2010
124views Healthcare» more  IHI 2010»
13 years 4 months ago
Reliable medical recommendation systems with patient privacy
One of the concerns patients have when confronted with a medical condition is which physician to trust. Any recommendation system that seeks to answer this question must ensure an...
T. Ryan Hoens, Marina Blanton, Nitesh V. Chawla
PODC
2010
ACM
13 years 10 months ago
On the theoretical gap between synchronous and asynchronous MPC protocols
Multiparty computation (MPC) protocols among n parties secure against t active faults are known to exist if and only if
Zuzana Beerliová-Trubíniová, ...
CORR
2008
Springer
133views Education» more  CORR 2008»
13 years 10 months ago
A New Stream Cipher: Dicing
: In this paper, we will propose a new synchronous stream cipher named DICING, which can be taken as a clock-controlled one but with a new mechanism of altering steps. With the sim...
An-Ping Li
IACR
2011
134views more  IACR 2011»
12 years 9 months ago
Efficient Implementation of Grand Cru with TI C6x+ Processor
Grand Cru, a candidate cipher algorithm of NESSIE project, is based on the strategy of multiple layered security and derived from AES-128. This algorithm was not selected for secon...
Azhar Ali Khan, Ghulam Murtaza
CTRSA
2009
Springer
106views Cryptology» more  CTRSA 2009»
14 years 1 months ago
Communication-Efficient Private Protocols for Longest Common Subsequence
We design communication efficient two-party and multi-party protocols for the longest common subsequence (LCS) and related problems. Our protocols achieve privacy with respect to p...
Matthew K. Franklin, Mark Gondree, Payman Mohassel