Secure two-party computation

Results: 88



#Item
41Complete Fairness in Secure Two-Party Computation S. Dov Gordon∗ Carmit Hazay†  Jonathan Katz‡

Complete Fairness in Secure Two-Party Computation S. Dov Gordon∗ Carmit Hazay† Jonathan Katz‡

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2014-09-16 05:31:04
    42Efficient Set Operations in the Presence of Malicious Adversaries Carmit Hazay∗ Kobbi Nissim†  November 25, 2010

    Efficient Set Operations in the Presence of Malicious Adversaries Carmit Hazay∗ Kobbi Nissim† November 25, 2010

    Add to Reading List

    Source URL: www.eng.biu.ac.il

    Language: English - Date: 2010-11-25 08:58:28
    43Complete Fairness in Secure Two-Party Computation S. Dov Gordon∗ Carmit Hazay†  Jonathan Katz‡

    Complete Fairness in Secure Two-Party Computation S. Dov Gordon∗ Carmit Hazay† Jonathan Katz‡

    Add to Reading List

    Source URL: www.eng.biu.ac.il

    Language: English - Date: 2014-09-16 05:31:04
    44An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries Benny Pinkas University of Haifa Yehuda Lindell, Bar-Ilan University

    An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries Benny Pinkas University of Haifa Yehuda Lindell, Bar-Ilan University

    Add to Reading List

    Source URL: www.iacr.org

    - Date: 2007-06-12 08:51:42
      45Efficient Two-Party Secure Computation on Committed Inputs Stanisław Jarecki and Vitaly Shmatikov 1 2

      Efficient Two-Party Secure Computation on Committed Inputs Stanisław Jarecki and Vitaly Shmatikov 1 2

      Add to Reading List

      Source URL: www.cyber-ta.org

      Language: English - Date: 2007-03-24 01:06:06
        46Secure Two-Party Computation  Faster Secure TwoTwo-Party Computation Using Garbled Circuits  Bob’s Genome: ACTG…

        Secure Two-Party Computation Faster Secure TwoTwo-Party Computation Using Garbled Circuits Bob’s Genome: ACTG…

        Add to Reading List

        Source URL: www.mightbeevil.org

        Language: English - Date: 2011-08-12 18:46:27
          47Secure Multiparty Computation and Secret Sharing - An Information Theoretic Appoach Ronald Cramer Ivan Damg˚ ard

          Secure Multiparty Computation and Secret Sharing - An Information Theoretic Appoach Ronald Cramer Ivan Damg˚ ard

          Add to Reading List

          Source URL: www.daimi.au.dk

          Language: English - Date: 2012-12-31 05:19:12
          48How To Play Almost Any Mental Game Over The Net — Concurrent Composition via Super-Polynomial Simulation Boaz Barak∗ Department of Computer Science Princeton University Princeton, New Jersey

          How To Play Almost Any Mental Game Over The Net — Concurrent Composition via Super-Polynomial Simulation Boaz Barak∗ Department of Computer Science Princeton University Princeton, New Jersey

          Add to Reading List

          Source URL: www.boazbarak.org

          Language: English - Date: 2011-10-10 23:49:36
          49Faster Secure Two-Party Computation Using Garbled Circuits  Yan Huang David Evans University of Virginia

          Faster Secure Two-Party Computation Using Garbled Circuits Yan Huang David Evans University of Virginia

          Add to Reading List

          Source URL: www.usenix.org

          Language: English - Date: 2011-06-09 13:31:32
          50Complete Fairness in Secure Two-Party Computation∗ S. Dov Gordon Carmit Hazay  Jonathan Katz

          Complete Fairness in Secure Two-Party Computation∗ S. Dov Gordon Carmit Hazay Jonathan Katz

          Add to Reading List

          Source URL: www.wisdom.weizmann.ac.il

          Language: English - Date: 2008-07-05 10:54:06