Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing. Bellare, M., Tung Hoang, V., & Rogaway, P. In Proceedings of ASIACRYPT, pages 134-153, 2012.
Paper bibtex @inproceedings{ dblp2123117,
title = {Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing},
author = {Mihir Bellare and Viet Tung Hoang and Phillip Rogaway},
author_short = {Bellare, M. and Tung Hoang, V. and Rogaway, P.},
bibtype = {inproceedings},
type = {inproceedings},
year = {2012},
key = {dblp2123117},
id = {dblp2123117},
biburl = {http://www.dblp.org/rec/bibtex/conf/asiacrypt/BellareHR12},
url = {http://dx.doi.org/10.1007/978-3-642-34961-4_10},
conference = {ASIACRYPT},
pages = {134-153},
text = {ASIACRYPT 2012:134-153},
booktitle = {Proceedings of ASIACRYPT}
}
Downloads: 0
{"_id":"YSqr3S3fwj2qDzfAk","bibbaseid":"bellare-tunghoang-rogaway-adaptivelysecuregarblingwithapplicationstoonetimeprogramsandsecureoutsourcing-2012","downloads":0,"creationDate":"2015-06-12T22:13:33.751Z","title":"Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing","author_short":["Bellare, M.","Tung Hoang, V.","Rogaway, P."],"year":2012,"bibtype":"inproceedings","biburl":"http://www.dblp.org/rec/bibtex/conf/asiacrypt/BellareHR12","bibdata":{"title":"Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing","author":["Mihir Bellare","Viet Tung Hoang","Phillip Rogaway"],"author_short":["Bellare, M.","Tung Hoang, V.","Rogaway, P."],"bibtype":"inproceedings","type":"inproceedings","year":"2012","key":"dblp2123117","id":"dblp2123117","biburl":"http://www.dblp.org/rec/bibtex/conf/asiacrypt/BellareHR12","url":"http://dx.doi.org/10.1007/978-3-642-34961-4_10","conference":"ASIACRYPT","pages":"134-153","text":"ASIACRYPT 2012:134-153","booktitle":"Proceedings of ASIACRYPT","bibtex":"@inproceedings{ dblp2123117,\n title = {Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing},\n author = {Mihir Bellare and Viet Tung Hoang and Phillip Rogaway},\n author_short = {Bellare, M. and Tung Hoang, V. and Rogaway, P.},\n bibtype = {inproceedings},\n type = {inproceedings},\n year = {2012},\n key = {dblp2123117},\n id = {dblp2123117},\n biburl = {http://www.dblp.org/rec/bibtex/conf/asiacrypt/BellareHR12},\n url = {http://dx.doi.org/10.1007/978-3-642-34961-4_10},\n conference = {ASIACRYPT},\n pages = {134-153},\n text = {ASIACRYPT 2012:134-153},\n booktitle = {Proceedings of ASIACRYPT}\n}","bibbaseid":"bellare-tunghoang-rogaway-adaptivelysecuregarblingwithapplicationstoonetimeprogramsandsecureoutsourcing-2012","role":"author","urls":{"Paper":"http://dx.doi.org/10.1007/978-3-642-34961-4_10"},"downloads":0},"search_terms":["adaptively","secure","garbling","applications","one","time","programs","secure","outsourcing","bellare","tung hoang","rogaway"],"keywords":[],"authorIDs":[],"dataSources":["hp8snbQhDPFoaux4g"]}