Skip to content

COED - Computing on Encrypted Data

1 - 10 out of 24Page size: 10
  1. 2016
  2. Published

    More Efficient Constant-Round Multi-Party Computation from BMR and SHE

    Lindell, Y., Smart, N. & Soria-Vázquez, E., Nov 2016, Theory of Cryptography: 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part I. Springer, p. 554-581 28 p. (Lecture Notes in Computer Science; vol. 9985).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Bootstrapping BGV Ciphertexts with a Wider Choice of p and q

    Orsini, E. A., Smart, N. P. & van de Pol, J., 27 Oct 2016, In : IET Information Security. 10, 6, p. 348-357

    Research output: Contribution to journalArticle

  4. Published

    A Unified Approach to MPC with Preprocessing Using OT

    Frederiksen, T. K., Keller, M. K. S., Orsini, E. A. & Scholl, P., 8 Jan 2016, Advances in Cryptology -- Asiacrypt 2015: 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part I. Iwata, T. & Cheon, J. H. (eds.). Auckland, New Zealand: Springer Berlin Heidelberg, p. 711-735 25 p. (Lecture Notes in Computer Science; vol. 9452).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Linear Overhead Optimally-resilient Robust MPC Using Preprocessing

    Choudhury, A., Orsini, E., Patra, A. & Smart, N., 2016, Security and Cryptography for Networks - SCN 2016: 10th International Conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016, Proceedings. Zikas, V. & De Prisco, R. (eds.). Springer, Vol. 9841. p. 147-168 22 p. (Lecture Notes in Computer Science; vol. 9841).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. 2015
  7. Published

    Finding shortest lattice vectors faster using quantum search

    Laarhoven, T., Mosca, M. & Van De Pol, J., Dec 2015, In : Designs, Codes and Cryptography. 77, 2, p. 375-400 26 p.

    Research output: Contribution to journalArticle

  8. Published

    Threshold FlipThem: When the winner does not need to take all

    Leslie, D., Sherfield, C. & Smart, N., 4 Nov 2015, Decision and Game Theory for Security - GameSec 2015. Springer, Vol. 9406. p. 74-92 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Actively Secure OT Extension with Optimal Overhead

    Keller, M., Orsini, E. & Scholl, P., 20 Aug 2015, Advances in Cryptology - CRYPTO 2015. Springer, Vol. 9215. p. 724-741 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Efficient Constant Round Multi-Party Computation Combining BMR and SPDZ

    Lindell, Y., Pinkas, B., Smart, N. & Yanai, A., 19 Aug 2015, Advances in Cryptology - CRYPTO 2015. Springer, Vol. 9216. p. 319-338 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Just a Little Bit More

    van de Pol, J., Smart, N. P. & Yarom, Y., 20 Apr 2015, Topics in Cryptology - CT-RSA 2015. Nyberg, K. (ed.). Springer International Publishing AG, Vol. 9048. p. 3-21 (Lecture Notes in Computer Science; vol. 9048).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Bootstrapping BGV ciphertexts with a wider choice of p and q

    Orsini, E. A., van de Pol, J. & Smart, N. P., 30 Mar 2015, Public-Key Cryptography - PKC 2015. Katz, J. (ed.). Springer Berlin Heidelberg, p. 673-698 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1 2 3 Next