-
1
-
-
84873969684
-
Garbling XOR gates "For free" in the standard model
-
Sahai, A. (ed.) TCC 2013. Springer, Heidelberg
-
Applebaum, B.: Garbling XOR gates "For free" in the standard model. In: Sahai, A. (ed.) TCC 2013. LNCS, vol. 7785, pp. 162-181. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.7785
, pp. 162-181
-
-
Applebaum, B.1
-
2
-
-
0025137207
-
The round complexity of secure protocols
-
(extended abstract). ACM Press
-
Beaver, D., Micali, S., Rogaway, P.: The round complexity of secure protocols (extended abstract). In: 22nd ACM STOC, pp. 503-513. ACM Press (1990)
-
(1990)
22nd ACM STOC
, pp. 503-513
-
-
Beaver, D.1
Micali, S.2
Rogaway, P.3
-
3
-
-
84869382999
-
Foundations of garbled circuits
-
Yu, T., Danezis, G., Gligor, V.D. (eds.) ACM Press
-
Bellare, M., Hoang, V.T., Rogaway, P.: Foundations of garbled circuits. In: Yu, T., Danezis, G., Gligor, V.D. (eds.) ACM CCS 2012, pp. 784-796. ACM Press (2012)
-
(2012)
ACM CCS 2012
, pp. 784-796
-
-
Bellare, M.1
Hoang, V.T.2
Rogaway, P.3
-
4
-
-
33746041431
-
The security of triple encryption and a framework for code-based game-playing proofs
-
DOI 10.1007/11761679-25, Advances in Cryptology - EUROCRYPT 2006 - 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
Bellare, M., Rogaway, P.: The security of triple encryption and a framework for code-based game-playing proofs. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 409-426. Springer, Heidelberg (2006) (Pubitemid 44072253)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4004 LNCS
, pp. 409-426
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
84863382720
-
On the security of the "Free- XOR" technique
-
Cramer, R. (ed.) TCC 2012. Springer, Heidelberg
-
Choi, S.G., Katz, J., Kumaresan, R., Zhou, H.-S.: On the security of the "Free- XOR" technique. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 39-53. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7194
, pp. 39-53
-
-
Choi, S.G.1
Katz, J.2
Kumaresan, R.3
Zhou, H.-S.4
-
6
-
-
51849125042
-
Scalable multiparty computation with nearly optimal work and resilience
-
Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
-
Damgård, I., Ishai, Y., Krøigaard, M., Nielsen, J.B., Smith, A.: Scalable multiparty computation with nearly optimal work and resilience. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 241-261. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 241-261
-
-
Damgård, I.1
Ishai, Y.2
Krøigaard, M.3
Nielsen, J.B.4
Smith, A.5
-
8
-
-
84884482346
-
A dynamic tradeoff between active and passive corruptions in secure multi-party computation
-
Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. Springer, Heidelberg
-
Hirt, M., Maurer, U., Lucas, C.: A dynamic tradeoff between active and passive corruptions in secure multi-party computation. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. LNCS, vol. 8043, pp. 203-219. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.8043
, pp. 203-219
-
-
Hirt, M.1
Maurer, U.2
Lucas, C.3
-
9
-
-
84892384788
-
Efficient general-adversary multi-party computation
-
Sako, K., Sarkar, P. (eds.) ASIACRYPT 2013, Part II. Springer, Heidelberg
-
Hirt, M., Tschudi, D.: Efficient general-adversary multi-party computation. In: Sako, K., Sarkar, P. (eds.) ASIACRYPT 2013, Part II. LNCS, vol. 8270, pp. 181-200. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.8270
, pp. 181-200
-
-
Hirt, M.1
Tschudi, D.2
-
10
-
-
84884477218
-
Efficient secure two-party computation using symmetric cut-and-choose
-
Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. Springer, Heidelberg
-
Huang, Y., Katz, J., Evans, D.: Efficient secure two-party computation using symmetric cut-and-choose. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. LNCS, vol. 8043, pp. 18-35. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.8043
, pp. 18-35
-
-
Huang, Y.1
Katz, J.2
Evans, D.3
-
11
-
-
24144457853
-
Extending oblivious transfers efficiently
-
Boneh, D. (ed.) CRYPTO 2003. Springer, Heidelberg
-
Ishai, Y., Kilian, J., Nissim, K., Petrank, E.: Extending oblivious transfers efficiently. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 145-161. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 145-161
-
-
Ishai, Y.1
Kilian, J.2
Nissim, K.3
Petrank, E.4
-
12
-
-
33646813314
-
Gate evaluation secret sharing and secure one-round two-party computation
-
Roy, B. (ed.) ASIACRYPT 2005. Springer, Heidelberg
-
Kolesnikov, V.: Gate evaluation secret sharing and secure one-round two-party computation. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 136-155. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3788
, pp. 136-155
-
-
Kolesnikov, V.1
-
13
-
-
84866677530
-
Improved secure two-party computation via information-theoretic garbled circuits
-
Visconti, I., De Prisco, R. (eds.) SCN 2012. Springer, Heidelberg
-
Kolesnikov, V., Kumaresan, R.: Improved secure two-party computation via information-theoretic garbled circuits. In: Visconti, I., De Prisco, R. (eds.) SCN 2012. LNCS, vol. 7485, pp. 205-221. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7485
, pp. 205-221
-
-
Kolesnikov, V.1
Kumaresan, R.2
-
14
-
-
84884483426
-
Improved OT extension for transferring short secrets
-
Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. Springer, Heidelberg
-
Kolesnikov, V., Kumaresan, R.: Improved OT extension for transferring short secrets. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. LNCS, vol. 8043, pp. 54-70. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.8043
, pp. 54-70
-
-
Kolesnikov, V.1
Kumaresan, R.2
-
15
-
-
49049099825
-
Improved garbled circuit: Free XOR gates and applications
-
Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. Springer, Heidelberg
-
Kolesnikov, V., Schneider, T.: Improved garbled circuit: Free XOR gates and applications. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol. 5126, pp. 486-498. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5126
, pp. 486-498
-
-
Kolesnikov, V.1
Schneider, T.2
-
16
-
-
84884490479
-
Fast cut-and-choose based protocols for malicious and covert adversaries
-
Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. Springer, Heidelberg
-
Lindell, Y.: Fast cut-and-choose based protocols for malicious and covert adversaries. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. LNCS, vol. 8043, pp. 1-17. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.8043
, pp. 1-17
-
-
Lindell, Y.1
-
17
-
-
84884472737
-
Garbled circuits checking garbled circuits: More efficient and secure two-party computation
-
Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. Springer, Heidelberg
-
Mohassel, P., Riva, B.: Garbled circuits checking garbled circuits: More efficient and secure two-party computation. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. LNCS, vol. 8043, pp. 36-53. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.8043
, pp. 36-53
-
-
Mohassel, P.1
Riva, B.2
-
18
-
-
84883898504
-
Privacy preserving auctions and mechanism design
-
ACM, New York
-
Naor, M., Pinkas, B., Sumner, R.: Privacy preserving auctions and mechanism design. In: Proceedings of the 1st ACM Conference on Electronic Commerce, EC 1999, pp. 129-139. ACM, New York (1999)
-
(1999)
Proceedings of the 1st ACM Conference on Electronic Commerce, EC 1999
, pp. 129-139
-
-
Naor, M.1
Pinkas, B.2
Sumner, R.3
-
19
-
-
72449131818
-
Secure two-party computation is practical
-
Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
-
Pinkas, B., Schneider, T., Smart, N.P., Williams, S.C.: Secure two-party computation is practical. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 250-267. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5912
, pp. 250-267
-
-
Pinkas, B.1
Schneider, T.2
Smart, N.P.3
Williams, S.C.4
-
20
-
-
79958017670
-
Two-output secure computation with malicious adversaries
-
Paterson, K.G. (ed.) EUROCRYPT 2011. Springer, Heidelberg
-
Shelat, A., Shen, C.-H.: Two-output secure computation with malicious adversaries. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 386-405. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6632
, pp. 386-405
-
-
Shelat, A.1
Shen, C.-H.2
|