-
1
-
-
17744381610
-
Universally composable protocols with relaxed set-up assumptions
-
Barak, B., Canetti, R., Nielsen, J.B., Pass, R.: Universally composable protocols with relaxed set-up assumptions. In: Proceedings of the 45th Annual Symposium on Foundations of Computer Science, pp. 186-195 (2004)
-
(2004)
Proceedings of the 45th Annual Symposium on Foundations of Computer Science
, pp. 186-195
-
-
Barak, B.1
Canetti, R.2
Nielsen, J.B.3
Pass, R.4
-
4
-
-
84867248592
-
Untraceable off-line cash in wallets with observers
-
Stinson, D.R, ed, CRYPTO 1993, Springer, Heidelberg
-
Brands, S.: Untraceable off-line cash in wallets with observers. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 302-318. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.773
, pp. 302-318
-
-
Brands, S.1
-
5
-
-
0035163054
-
-
Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: In Proceedings of the 42nd Annual Symposium on Foundations of Computer Science, pp. 136-145 (2001); An updated version is available from the Cryptology ePrint Archive, Report 2000/067
-
Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: In Proceedings of the 42nd Annual Symposium on Foundations of Computer Science, pp. 136-145 (2001); An updated version is available from the Cryptology ePrint Archive, Report 2000/067
-
-
-
-
6
-
-
38049064364
-
Universally composable security with global setup
-
Canetti, R., Dodis, Y., Pass, R., Walfish, S.: Universally composable security with global setup. In: Proceedings of the 4th Theory of Cryptography Conference, pp. 61-85 (2007)
-
(2007)
Proceedings of the 4th Theory of Cryptography Conference
, pp. 61-85
-
-
Canetti, R.1
Dodis, Y.2
Pass, R.3
Walfish, S.4
-
7
-
-
84880897758
-
Universally composable commitments
-
Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
-
Canetti, R., Fischlin, M.: Universally composable commitments. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 19-40. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 19-40
-
-
Canetti, R.1
Fischlin, M.2
-
8
-
-
32844458303
-
On the limitations of universally composable two-party computation without set-up assumptions
-
Canetti, R., Kushilevitz, E., Lindell, Y.: On the limitations of universally composable two-party computation without set-up assumptions. Journal of Cryptology 19(2), 135-167 (2006)
-
(2006)
Journal of Cryptology
, vol.19
, Issue.2
, pp. 135-167
-
-
Canetti, R.1
Kushilevitz, E.2
Lindell, Y.3
-
9
-
-
0036038991
-
Universally composable two-party and multi-party secure computation
-
Canetti, R., Lindell, Y., Ostrovsky, R., Sahai, A.: Universally composable two-party and multi-party secure computation. In: Proceedings of the 34th Annual ACM Symposium on the Theory of Computing, pp. 494-503 (2002)
-
(2002)
Proceedings of the 34th Annual ACM Symposium on the Theory of Computing
, pp. 494-503
-
-
Canetti, R.1
Lindell, Y.2
Ostrovsky, R.3
Sahai, A.4
-
10
-
-
44449114476
-
Improved UC secure computation using tamper-proof hardware. Cryptology ePrint Archive
-
Report 2007/334
-
Chandran, N., Goyal, V., Sahai, A.: Improved UC secure computation using tamper-proof hardware. Cryptology ePrint Archive, Report 2007/334 (2007)
-
(2007)
-
-
Chandran, N.1
Goyal, V.2
Sahai, A.3
-
11
-
-
85001025766
-
Wallet databases with observers
-
Brickell, E.F, ed, CRYPTO 1992, Springer, Heidelberg
-
Chaum, D., Pedersen, T.P.: Wallet databases with observers. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 89-105. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.740
, pp. 89-105
-
-
Chaum, D.1
Pedersen, T.P.2
-
12
-
-
84988327580
-
Improved privacy in wallets with observers
-
Helleseth, T, ed, EUROCRYPT 1993, Springer, Heidelberg
-
Cramer, R., Pedersen, T.P.: Improved privacy in wallets with observers. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 329-343. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.765
, pp. 329-343
-
-
Cramer, R.1
Pedersen, T.P.2
-
13
-
-
84957356475
-
Efficient cryptographic protocols based on noisy channels
-
Fumy, W, ed, EUROCRYPT 1997, Springer, Heidelberg
-
Crépeau, C.: Efficient cryptographic protocols based on noisy channels. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 306-317. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1233
, pp. 306-317
-
-
Crépeau, C.1
-
15
-
-
26444482584
-
Unfair noisy channels and oblivious transfer
-
Damgård, I., Fehr, S., Morozov, K., Salvail, L.: Unfair noisy channels and oblivious transfer. In: Proceedings of the 1st Theory of Cryptography Conference, pp. 355-373 (2004)
-
(2004)
Proceedings of the 1st Theory of Cryptography Conference
, pp. 355-373
-
-
Damgård, I.1
Fehr, S.2
Morozov, K.3
Salvail, L.4
-
16
-
-
84957697395
-
On the (im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions
-
Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
-
Damgård, I., Kilian, J., Salvail, L.: On the (im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 56-73. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 56-73
-
-
Damgård, I.1
Kilian, J.2
Salvail, L.3
-
17
-
-
44449154117
-
Universally composable multiparty computation with partially isolated parties. Cryptology ePrint Archive
-
Report 2007/332
-
Damgård, I., Nielsen, J.B., Wichs, D.: Universally composable multiparty computation with partially isolated parties. Cryptology ePrint Archive, Report 2007/332 (2007)
-
(2007)
-
-
Damgård, I.1
Nielsen, J.B.2
Wichs, D.3
-
18
-
-
38049138208
-
Cryptography in the multi-string model
-
Menezes, A, ed, CRYPTO 2007, Springer, Heidelberg
-
Groth, J., Ostrovsky, R.: Cryptography in the multi-string model. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 323-341. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4622
, pp. 323-341
-
-
Groth, J.1
Ostrovsky, R.2
-
20
-
-
38049150653
-
Universally composable multi-party computation using tamper-proof hardware
-
Naor, M, ed, EUROCRYPT 2007, Springer, Heidelberg
-
Katz, J.: Universally composable multi-party computation using tamper-proof hardware. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 115-128. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4515
, pp. 115-128
-
-
Katz, J.1
-
22
-
-
0001226672
-
A parallel repetition theorem
-
Raz, R.: A parallel repetition theorem. SIAM Journal on Computing 27(3), 763-803 (1998)
-
(1998)
SIAM Journal on Computing
, vol.27
, Issue.3
, pp. 763-803
-
-
Raz, R.1
|