Zobrazeno 1 - 10
of 652
pro vyhledávání: '"Nigel P. Smart"'
Autor:
Walsh, P. G.
Publikováno v:
Mathematics of Computation, 2001 Jul 01. 70(235), 1349-1352.
Externí odkaz:
https://www.jstor.org/stable/2698826
Autor:
Giblin, Peter
Publikováno v:
The Mathematical Gazette, 1999 Nov 01. 83(498), 559-560.
Externí odkaz:
https://www.jstor.org/stable/3621016
Autor:
Peter Giblin
Publikováno v:
The Mathematical Gazette. 83:559-560
Publikováno v:
IACR Transactions on Symmetric Cryptology, Pp 294-324 (2017)
We examine how two parallel modes of operation for Authenticated Encryption (namely CTR+PMAC and OTR mode) work when evaluated in a multiparty computation engine. These two modes are selected because they suit the PRFs examined in previous works. In
Externí odkaz:
https://doaj.org/article/25e4b48a8c4a426c94701f2823707272
Autor:
Nigel P. Smart
Beginning with a brief introduction to algorithms and diophantine equations, this volume aims to provide a coherent account of the methods used to find all the solutions to certain diophantine equations, particularly those procedures which have been
Publikováno v:
Baum, C, Jadoul, R, Orsini, E, Scholl, P & Smart, N P 2022, Feta : Efficient Threshold Designated-Verifier Zero-Knowledge Proofs . in CCS'22-Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security . Association for Computing Machinery, New York, pp. 293-306, 28th ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, United States, 07/11/2022 . https://doi.org/10.1145/3548606.3559354
Zero-Knowledge protocols have increasingly become both popular and practical in recent years due to their applicability in many areas such as blockchain systems. Unfortunately, public verifiability and small proof sizes of zero-knowledge protocols cu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c44e73e32a3b3b47199f71b22dec7a69
https://lirias.kuleuven.be/handle/20.500.12942/716067
https://lirias.kuleuven.be/handle/20.500.12942/716067
Publikováno v:
Selected Areas in Cryptography ISBN: 9783030992767
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Selected Areas in Cryptography
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Selected Areas in Cryptography
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6623d21cff24803b27a8e63d912c6a1e
https://doi.org/10.1007/978-3-030-99277-4_7
https://doi.org/10.1007/978-3-030-99277-4_7
Publikováno v:
Journal of Cryptology
ispartof: JOURNAL OF CRYPTOLOGY vol:35 issue:1 status: published
Publikováno v:
Intelligent Systems in Accounting, Finance and Management
Cartlidge, J, Smart, N P & Talibi Alaoui, Y 2021, ' Multi-party computation mechanism for anonymous equity block trading : A secure implementation of turquoise plato uncross ', Intelligent Systems in Accounting, Finance and Management, vol. 28, no. 4, pp. 239-267 . https://doi.org/10.1002/isaf.1502
Cartlidge, J, Smart, N P & Talibi Alaoui, Y 2021, ' Multi-party computation mechanism for anonymous equity block trading : A secure implementation of turquoise plato uncross ', Intelligent Systems in Accounting, Finance and Management, vol. 28, no. 4, pp. 239-267 . https://doi.org/10.1002/isaf.1502
Dark pools are financial trading venues where orders are entered and matched in secret so that no order information is leaked. By preventing information leakage, dark pools offer the opportunity for large volume block traders to avoid the costly effe
Autor:
Nigel P. Smart, Cyprien Delpech de Saint Guilhem, Karim Baghery, Emmanuela Orsini, Titouan Tanguy
Publikováno v:
Topics in Cryptology-CT-RSA 2021
Topics in Cryptology – CT-RSA 2021 ISBN: 9783030755386
CT-RSA
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Topics in Cryptology – CT-RSA 2021
Topics in Cryptology – CT-RSA 2021 ISBN: 9783030755386
CT-RSA
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Topics in Cryptology – CT-RSA 2021
This paper introduces M-Circuits, a program representation which generalizes arithmetic and binary circuits. This new representation is motivated by the way modern multi-party computation (MPC) systems based on linear secret sharing schemes actually