-
1
-
-
38049082907
-
Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries
-
Vadhan, S.P. (ed.) TCC 2007 Springer, Heidelberg
-
Aumann, Y., Lindell, Y.: Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 137-156. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4392
, pp. 137-156
-
-
Aumann, Y.1
Lindell, Y.2
-
2
-
-
17744381610
-
Universally composable protocols with relaxed set-up assumptions
-
IEEE Computer Society
-
Barak, B., Canetti, R., Nielsen, J.B., Pass, R.: Universally composable protocols with relaxed set-up assumptions. In: FOCS, pp. 186-195. IEEE Computer Society (2004)
-
(2004)
FOCS
, pp. 186-195
-
-
Barak, B.1
Canetti, R.2
Nielsen, J.B.3
Pass, R.4
-
3
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
Canetti, R.: Security and composition of multiparty cryptographic protocols. J. Cryptology 13(1), 143-202 (2000)
-
(2000)
J. Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
4
-
-
77949608607
-
From Passive to Covert Security at Low Cost
-
Micciancio, D. (ed.) TCC 2010 Springer, Heidelberg
-
Damgård, I., Geisler, M., Nielsen, J.B.: From Passive to Covert Security at Low Cost. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 128-145. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.5978
, pp. 128-145
-
-
Damgård, I.1
Geisler, M.2
Nielsen, J.B.3
-
5
-
-
0026985378
-
Communication complexity of secure computation
-
extended abstract
-
Franklin, M.K., Yung, M.: Communication complexity of secure computation (extended abstract). In: STOC, pp. 699-710 (1992)
-
(1992)
STOC
, pp. 699-710
-
-
Franklin, M.K.1
Yung, M.2
-
6
-
-
44449160882
-
Efficient Two Party and Multi Party Computation Against Covert Adversaries
-
Smart, N.P. (ed.) EUROCRYPT 2008 Springer, Heidelberg
-
Goyal, V., Mohassel, P., Smith, A.: Efficient Two Party and Multi Party Computation Against Covert Adversaries. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 289-306. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4965
, pp. 289-306
-
-
Goyal, V.1
Mohassel, P.2
Smith, A.3
-
7
-
-
33645593031
-
Foundations of Cryptography
-
Cambridge University Press
-
Goldreich, O.: Foundations of Cryptography, Basic Applications, vol. 2. Cambridge University Press (2004)
-
(2004)
Basic Applications
, vol.2
-
-
Goldreich, O.1
-
8
-
-
40249108370
-
Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
-
Canetti, R. (ed.) TCC 2008 Springer, Heidelberg
-
Hazay, C., Lindell, Y.: Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 155-175. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4948
, pp. 155-175
-
-
Hazay, C.1
Lindell, Y.2
-
10
-
-
24144457853
-
Extending Oblivious Transfers Efficiently
-
Boneh, D. (ed.) CRYPTO 2003 Springer, Heidelberg
-
Ishai, Y., Kilian, J., Nissim, K., Petrank, E.: Extending Oblivious Transfers Efficiently. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 145-161. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 145-161
-
-
Ishai, Y.1
Kilian, J.2
Nissim, K.3
Petrank, E.4
-
11
-
-
64249101946
-
A proof of security of yao's protocol for two-party computation
-
Lindell, Y., Pinkas, B.: A proof of security of yao's protocol for two-party computation. J. Cryptology 22(2), 161-188 (2009)
-
(2009)
J. Cryptology
, vol.22
, Issue.2
, pp. 161-188
-
-
Lindell, Y.1
Pinkas, B.2
-
12
-
-
85084163840
-
Fairplay - Secure two-party computation system
-
Malkhi, D., Nisan, N., Pinkas, B., Sella, Y.: Fairplay - secure two-party computation system. In: USENIX Security Symposium, pp. 287-302 (2004)
-
(2004)
USENIX Security Symposium
, pp. 287-302
-
-
Malkhi, D.1
Nisan, N.2
Pinkas, B.3
Sella, Y.4
-
13
-
-
51849126892
-
A Framework for Efficient and Composable Oblivious Transfer
-
Wagner, D. (ed.) CRYPTO 2008 Springer, Heidelberg
-
Peikert, C., Vaikuntanathan, V., Waters, B.: A Framework for Efficient and Composable Oblivious Transfer. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 554-571. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 554-571
-
-
Peikert, C.1
Vaikuntanathan, V.2
Waters, B.3
|