CryptoDB
How to Securely Outsource Cryptographic Computations
| Authors: | |
|---|---|
| Download: | |
| Conference: | TCC 2005 |
BibTeX
@inproceedings{tcc-2005-3678,
title={How to Securely Outsource Cryptographic Computations},
booktitle={Theory of Cryptography, Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings},
series={Lecture Notes in Computer Science},
publisher={Springer},
volume={3378},
pages={264-282},
url={https://iacr.org/archive/tcc2005/3378_265/3378_265.pdf},
doi={10.1007/978-3-540-30576-7_15},
author={Susan Hohenberger and Anna Lysyanskaya},
year=2005
}