Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
29
views
14
references
Top references
cited by
19
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,545
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology - EUROCRYPT 2007
Secure Computation from Random Error Correcting Codes
other
Author(s):
Hao Chen
,
Ronald Cramer
,
Shafi Goldwasser
,
Robbert de Haan
,
Vinod Vaikuntanathan
Publication date
(Print):
2007
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Further versions
open (via free pdf)
Powered by
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
AIP Publishing: Coronavirus
Most cited references
14
Record
: found
Abstract
: not found
Article
: not found
Generalized Hamming weights for linear codes
V.K. Wei
(1991)
0
comments
Cited
136
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
On the Asymptotic Behaviour of Some Towers of Function Fields over Finite Fields
Arnaldo Garcia
,
Henning Stichtenoth
(1996)
0
comments
Cited
52
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Efficient Multiparty Protocols Using Circuit Randomization
Donald C. Beaver
(1992)
0
comments
Cited
52
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2007
Pages
: 291-310
DOI:
10.1007/978-3-540-72540-4_17
SO-VID:
26e5a87a-c9c0-455b-99ec-40b5ee8a4844
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Chosen-Prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities
pp. 534
Feistel Networks Made Public, and Applications
pp. 79
Revisiting the Efficiency of Malicious Two-Party Computation
pp. 97
Efficient Two-Party Secure Computation on Committed Inputs
pp. 115
Universally Composable Multi-party Computation Using Tamper-Proof Hardware
pp. 210
Mesh Signatures
pp. 246
Batch Verification of Short Signatures
pp. 291
Secure Computation from Random Error Correcting Codes
pp. 347
Cryptanalysis of the Sidelnikov Cryptosystem
pp. 394
General Ad Hoc Encryption from Exponent Inversion IBE
pp. 555
Oblivious-Transfer Amplification
pp. 573
Simulatable Adaptive Oblivious Transfer
Similar content
1,545
Editorial: Regulation of tumor-immune microenvironment by non-coding RNAs
Authors:
Rajeev Nema
,
Rohit Saluja
,
Ashok Kumar
Dynamic population coding of category information in inferior temporal and prefrontal cortex.
Authors:
Ethan M. Meyers
,
David J. Freedman
,
Gabriel Kreiman
…
Shannon Entropy Analysis of the Genome Code
Authors:
J. A. Tenreiro Machado
See all similar
Cited by
19
OT-Combiners via Secure Computation
Authors:
Danny Harnik
,
Yuval Ishai
,
Eyal Kushilevitz
…
Relative Generalized Rank Weight of Linear Codes and Its Applications to Network Coding
Authors:
Jun Kurihara
,
Ryutaroh Matsumoto
,
Tomohiko Uyematsu
The Torsion-Limit for Algebraic Function Fields and Its Application to Arithmetic Secret Sharing
Authors:
Ignacio Cascudo
,
Ronald Cramer
,
Chaoping Xing
See all cited by