1018 results in Cryptography ,Cryptology and Coding
Part I - Secure Multiparty Computation
-
- Book:
- Secure Multiparty Computation and Secret Sharing
- Published online:
- 05 August 2015
- Print publication:
- 15 July 2015, pp 1-2
-
- Chapter
- Export citation
Part II - Secret Sharing
-
- Book:
- Secure Multiparty Computation and Secret Sharing
- Published online:
- 05 August 2015
- Print publication:
- 15 July 2015, pp 201-202
-
- Chapter
- Export citation
List of Exercises
-
- Book:
- Secure Multiparty Computation and Secret Sharing
- Published online:
- 05 August 2015
- Print publication:
- 15 July 2015, pp 357-358
-
- Chapter
- Export citation
4 - Models
- from Part I - Secure Multiparty Computation
-
- Book:
- Secure Multiparty Computation and Secret Sharing
- Published online:
- 05 August 2015
- Print publication:
- 15 July 2015, pp 51-103
-
- Chapter
- Export citation
Contents
-
- Book:
- Secure Multiparty Computation and Secret Sharing
- Published online:
- 05 August 2015
- Print publication:
- 15 July 2015, pp v-viii
-
- Chapter
- Export citation
Frontmatter
-
- Book:
- Secure Multiparty Computation and Secret Sharing
- Published online:
- 05 August 2015
- Print publication:
- 15 July 2015, pp i-iv
-
- Chapter
- Export citation
8 - Some Techniques for Efficiency Improvements
- from Part I - Secure Multiparty Computation
-
- Book:
- Secure Multiparty Computation and Secret Sharing
- Published online:
- 05 August 2015
- Print publication:
- 15 July 2015, pp 163-181
-
- Chapter
- Export citation
Preface
-
- Book:
- Cryptography and Secure Communication
- Published online:
- 05 April 2014
- Print publication:
- 27 March 2014, pp xv-xviii
-
- Chapter
- Export citation
5 - Information-theoretic methods in cryptography
-
- Book:
- Cryptography and Secure Communication
- Published online:
- 05 April 2014
- Print publication:
- 27 March 2014, pp 135-159
-
- Chapter
- Export citation
11 - Cryptography based on hyperelliptic curves
-
- Book:
- Cryptography and Secure Communication
- Published online:
- 05 April 2014
- Print publication:
- 27 March 2014, pp 369-421
-
- Chapter
- Export citation
Frontmatter
-
- Book:
- Cryptography and Secure Communication
- Published online:
- 05 April 2014
- Print publication:
- 27 March 2014, pp i-iv
-
- Chapter
- Export citation
Acknowledgments
-
- Book:
- Cryptography and Secure Communication
- Published online:
- 05 April 2014
- Print publication:
- 27 March 2014, pp xix-xx
-
- Chapter
- Export citation
7 - Stream ciphers
-
- Book:
- Cryptography and Secure Communication
- Published online:
- 05 April 2014
- Print publication:
- 27 March 2014, pp 181-217
-
- Chapter
- Export citation
![](https://assets.cambridge.org/97811070/14275/cover/9781107014275.jpg)
Cryptography and Secure Communication
-
- Published online:
- 05 April 2014
- Print publication:
- 27 March 2014
12 - Cryptography based on bilinear pairings
-
- Book:
- Cryptography and Secure Communication
- Published online:
- 05 April 2014
- Print publication:
- 27 March 2014, pp 422-474
-
- Chapter
- Export citation
10 - Cryptography based on elliptic curves
-
- Book:
- Cryptography and Secure Communication
- Published online:
- 05 April 2014
- Print publication:
- 27 March 2014, pp 294-368
-
- Chapter
- Export citation
3 - Cryptography based on the integer ring
-
- Book:
- Cryptography and Secure Communication
- Published online:
- 05 April 2014
- Print publication:
- 27 March 2014, pp 82-106
-
- Chapter
- Export citation
15 - More public-key cryptography
-
- Book:
- Cryptography and Secure Communication
- Published online:
- 05 April 2014
- Print publication:
- 27 March 2014, pp 527-557
-
- Chapter
- Export citation
Index
-
- Book:
- Cryptography and Secure Communication
- Published online:
- 05 April 2014
- Print publication:
- 27 March 2014, pp 576-587
-
- Chapter
- Export citation
13 - Implementation
-
- Book:
- Cryptography and Secure Communication
- Published online:
- 05 April 2014
- Print publication:
- 27 March 2014, pp 475-507
-
- Chapter
- Export citation