Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Younes Talibi Alaoui"'
Publikováno v:
Intelligent Systems in Accounting, Finance and Management
Cartlidge, J, Smart, N P & Talibi Alaoui, Y 2021, ' Multi-party computation mechanism for anonymous equity block trading : A secure implementation of turquoise plato uncross ', Intelligent Systems in Accounting, Finance and Management, vol. 28, no. 4, pp. 239-267 . https://doi.org/10.1002/isaf.1502
Cartlidge, J, Smart, N P & Talibi Alaoui, Y 2021, ' Multi-party computation mechanism for anonymous equity block trading : A secure implementation of turquoise plato uncross ', Intelligent Systems in Accounting, Finance and Management, vol. 28, no. 4, pp. 239-267 . https://doi.org/10.1002/isaf.1502
Dark pools are financial trading venues where orders are entered and matched in secret so that no order information is leaked. By preventing information leakage, dark pools offer the opportunity for large volume block traders to avoid the costly effe
Publikováno v:
Topics in Cryptology-CT-RSA 2021
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Topics in Cryptology – CT-RSA 2021
Topics in Cryptology – CT-RSA 2021 ISBN: 9783030755386
CT-RSA
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Topics in Cryptology – CT-RSA 2021
Topics in Cryptology – CT-RSA 2021 ISBN: 9783030755386
CT-RSA
Iterative methods are a standard technique in many areas of scientific computing. The key idea is that a function is applied repeatedly until the resulting sequence converges to the correct answer. When applying such methods in a secure computation m
Publikováno v:
Information Security and Privacy-24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019, Proceedings
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Information Security and Privacy
Information Security and Privacy ISBN: 9783030215477
ACISP
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Information Security and Privacy
Information Security and Privacy ISBN: 9783030215477
ACISP
We show how to build distributed key generation and distributed decryption procedures for the \(\textsf {LIMA} \) Ring-LWE based post-quantum cryptosystem. Our protocols implement the CCA variants of distributed decryption and are actively secure (wi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::51c2f71e5b0c4c0a45363d57b2c20d01
https://lirias.kuleuven.be/handle/123456789/641965
https://lirias.kuleuven.be/handle/123456789/641965
Publikováno v:
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security-Asia CCS 19
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security -Asia CCS '19
Cartlidge, J, Smart, N & Talibi Alaoui, Y 2019, MPC Joins The Dark Side . in Asia CCS 2019: Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security . Association for Computing Machinery (ACM), pp. 148-159, 2019 ACM Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, 9/07/19 . https://doi.org/10.1145/3321705.3329809
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security
AsiaCCS
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security -Asia CCS '19
Cartlidge, J, Smart, N & Talibi Alaoui, Y 2019, MPC Joins The Dark Side . in Asia CCS 2019: Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security . Association for Computing Machinery (ACM), pp. 148-159, 2019 ACM Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, 9/07/19 . https://doi.org/10.1145/3321705.3329809
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security
AsiaCCS
We consider the issue of securing dark pools/markets in thefinancial services sector. Currently, these markets are executed via trusted third parties, which opens potential for market operators to conduct fraud. We present a potential solution to thi
Autor:
Younes Talibi Alaoui, Nigel P. Smart
Publikováno v:
Cryptography and Coding ISBN: 9783030351984
IMACC
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Cryptography and Coding
Cryptography and Coding-17th IMA International Conference, IMACC 2019, Oxford, UK, December 16–18, 2019, Proceedings
IMACC
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Cryptography and Coding
Cryptography and Coding-17th IMA International Conference, IMACC 2019, Oxford, UK, December 16–18, 2019, Proceedings
We show how to perform a full-threshold n-party actively secure MPC protocol over a subgroup of order p of an elliptic curve group E(K). This is done by utilizing a full-threshold n-party actively secure MPC protocol over \(\mathbb {F}_p\) in the pre
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f1b0425108852da148dca47f5796a42d
https://doi.org/10.1007/978-3-030-35199-1_17
https://doi.org/10.1007/978-3-030-35199-1_17
Publikováno v:
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Topics in Cryptology – CT-RSA 2022
Topics in Cryptology-CT-RSA 2022
Topics in Cryptology – CT-RSA 2022 ISBN: 9783030953119
Lecture Notes in Computer Science-Topics in Cryptology – CT-RSA 2022
Topics in Cryptology-CT-RSA 2022
Topics in Cryptology – CT-RSA 2022 ISBN: 9783030953119
timestamp: Thu, 03 Feb 2022 09:28:39 +0100 biburl: https://dblp.org/rec/conf/ctrsa/AtapoorSA22.bib bibsource: dblp computer science bibliography, https://dblp.org ispartof: pages:96-119 ispartof: Topics in Cryptology - CT-RSA 2022 - Cryptographers’
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2d573fbfad766f7d7a0013c98169ff49