Secure two-party computation

Results: 88



#Item
31Fairness with Penalties  Delegated Computation Multiparty Fair Exchange

Fairness with Penalties Delegated Computation Multiparty Fair Exchange

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2014-11-14 17:50:41
32One-Sided Adaptively Secure Two-Party Computation Carmit Hazay∗ Arpita Patra†  Abstract

One-Sided Adaptively Secure Two-Party Computation Carmit Hazay∗ Arpita Patra† Abstract

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2014-02-20 10:41:27
    33MiniLEGO: Efficient Secure Two-Party Computation From General Assumptions (Full Version) Tore Kasper Frederiksen1 , Thomas Pelle Jakobsen1 , Jesper Buus Nielsen1 , Peter Sebastian Nordholt1 , and Claudio Orlandi1 ?

    MiniLEGO: Efficient Secure Two-Party Computation From General Assumptions (Full Version) Tore Kasper Frederiksen1 , Thomas Pelle Jakobsen1 , Jesper Buus Nielsen1 , Peter Sebastian Nordholt1 , and Claudio Orlandi1 ?

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2013-04-29 05:32:11
    34Efficient Secure Two-Party Protocols: Techniques and Constructions

    Efficient Secure Two-Party Protocols: Techniques and Constructions

    Add to Reading List

    Source URL: www.eng.biu.ac.il

    Language: English - Date: 2014-09-16 07:30:08
    35Review of5 Efficient Secure Two-Party Protocols: Techniques and Constructions by Carmit Hazay and Yehuda Lindell Springer, 2010 Reviewed by Jonathan Katz

    Review of5 Efficient Secure Two-Party Protocols: Techniques and Constructions by Carmit Hazay and Yehuda Lindell Springer, 2010 Reviewed by Jonathan Katz

    Add to Reading List

    Source URL: u.cs.biu.ac.il

    Language: English - Date: 2012-02-29 01:45:21
    36Secure Two-Party Computation with Low Communication Ivan Damg˚ard∗ Sebastian Faust†  Carmit Hazay‡

    Secure Two-Party Computation with Low Communication Ivan Damg˚ard∗ Sebastian Faust† Carmit Hazay‡

    Add to Reading List

    Source URL: www.eng.biu.ac.il

    Language: English - Date: 2013-10-04 08:09:02
    37Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries∗ Carmit Hazay† Yehuda Lindell†

    Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries∗ Carmit Hazay† Yehuda Lindell†

    Add to Reading List

    Source URL: www.eng.biu.ac.il

    Language: English - Date: 2014-09-16 05:37:56
    38An extended abstract of this paper was published in the proceedings of CT-RSAEfficient RSA Key Generation and Threshold Paillier in the Two-Party Setting Carmit Hazay∗

    An extended abstract of this paper was published in the proceedings of CT-RSAEfficient RSA Key Generation and Threshold Paillier in the Two-Party Setting Carmit Hazay∗

    Add to Reading List

    Source URL: www.eng.biu.ac.il

    Language: English - Date: 2014-02-21 12:47:44
    39Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries∗ Carmit Hazay† Yehuda Lindell†

    Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries∗ Carmit Hazay† Yehuda Lindell†

    Add to Reading List

    Source URL: www.eng.biu.ac.il

    Language: English - Date: 2014-09-16 05:37:56
    40Towards a Game Theoretic View of Secure Computation Gilad Asharov∗ Ran Canetti†

    Towards a Game Theoretic View of Secure Computation Gilad Asharov∗ Ran Canetti†

    Add to Reading List

    Source URL: www.eng.biu.ac.il

    Language: English - Date: 2015-07-03 05:13:02