搜索结果: 1-2 共查到“军事学 public-key operations”相关记录2条 . 查询时间(0.062 秒)
Two-Round Multiparty Secure Computation Minimizing Public Key Operations
cryptographic protocols public-key operations
2018/3/6
We show new constructions of semi-honest and malicious two-round multiparty secure computation protocols using only (a fixed) poly(n,λ)poly(n,λ) invocations of a two-round oblivious transfer protocol ...
How to implement the public Key Operations in Code-based Cryptography on Memory-constrained Devices
post-quantum cryptography code-based cryptography public key encryption scheme efficient implementation embedded devices
2010/9/9
While it is generally believed that due to their large public key sizes code based public key schemes cannot be conveniently used when memory-constrained devices are involved, we propose an approach f...