Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
11
views
11
references
Top references
cited by
0
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,075
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Conditional Oblivious Cast
other
Author(s):
Cheng-Kang Chu
,
Wen-Guey Tzeng
Publication date
(Print):
2006
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Further versions
open (via free pdf)
Powered by
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
ScienceOpen Research
Most cited references
11
Record
: found
Abstract
: not found
Book Chapter
: not found
Evaluating 2-DNF Formulas on Ciphertexts
Dan Boneh
,
Eu-Jin Goh
,
Kobbi Nissim
(2005)
0
comments
Cited
139
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Multiparty Computation from Threshold Homomorphic Encryption
Ronald Cramer
,
Ivan Damgård
,
Jesper B. Nielsen
(2001)
0
comments
Cited
56
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Priced Oblivious Transfer: How to Sell Digital Goods
Bill Aiello
,
Yuval Ishai
,
Omer Reingold
(2001)
0
comments
Cited
56
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2006
Pages
: 443-457
DOI:
10.1007/11745853_29
SO-VID:
54c69b75-2f81-4fd0-aeed-79a6a28aa14f
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
New Attacks on RSA with Small Secret CRT-Exponents
pp. 14
An Attack on a Modified Niederreiter Encryption Scheme
pp. 27
Cryptanalysis of an Efficient Proof of Knowledge of Discrete Logarithm
pp. 44
Efficient Polynomial Operations in the Shared-Coefficients Setting
pp. 58
Generic On-Line/Off-Line Threshold Signatures
pp. 75
Linear Integer Secret Sharing and Distributed Exponentiation
pp. 91
Encoding-Free ElGamal Encryption Without Random Oracles
pp. 105
Parallel Key-Insulated Public Key Encryption
pp. 123
Provably Secure Steganography with Imperfect Sampling
pp. 140
Collision-Resistant No More: Hash-and-Sign Paradigm Revisited
pp. 157
Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption
pp. 174
An Algorithm to Solve the Discrete Logarithm Problem with the Number Field Sieve
pp. 191
Efficient Scalar Multiplication by Isogeny Decompositions
pp. 229
Strongly Unforgeable Signatures Based on Computational Diffie-Hellman
pp. 241
Generalization of the Selective-ID Security Model for HIBE Protocols
pp. 257
Identity-Based Aggregate Signatures
pp. 274
On the Limitations of the Spread of an IBE-to-PKE Transformation
pp. 290
Inoculating Multivariate Schemes Against Differential Attacks
pp. 302
Random Subgroups of Braid Groups: An Approach to Cryptanalysis of a Braid Group Based Cryptographic Protocol
pp. 315
High-Order Attacks Against the Exponent Splitting Protection
pp. 330
New Online/Offline Signature Schemes Without Random Oracles
pp. 347
Anonymous Signature Schemes
pp. 364
The Power of Identification Schemes
pp. 378
Security Analysis of KEA Authenticated Key Exchange Protocol
pp. 395
SAS-Based Authenticated Key Agreement
pp. 410
The Twist-AUgmented Technique for Key Exchange
pp. 427
Password-Based Group Key Exchange in a Constant Number of Rounds
pp. 443
Conditional Oblivious Cast
pp. 458
Efficiency Tradeoffs for Malicious Two-Party Computation
pp. 474
On Constructing Certificateless Cryptosystems from Identity Based Encryption
pp. 491
Building Better Signcryption Schemes with Tag-KEMs
pp. 508
Security-Mediated Certificateless Cryptography
pp. 525
k-Times Anonymous Authentication with a Constant Proving Cost
Similar content
1,075
More is Less: Perfectly Secure Oblivious Algorithms in the Multi-server Setting
Authors:
T.-H. Hubert Chan
,
Jonathan Katz
,
Kartik Nayak
…
TuringMobile: A Turing Machine of Oblivious Mobile Robots with Limited Visibility and its Applications
Authors:
Paola Flocchini
,
Giuseppe A. Di Luna
,
Giovanni Viglietta
…
Imperfect 1-out-of-2 quantum oblivious transfer: bounds, a protocol, and its experimental implementation
Authors:
Ryan Amiri
,
Robert Stárek
,
Michal Mičuda
…
See all similar