Universal composability

Results: 55



#Item
11Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries∗ Carmit Hazay† Yehuda Lindell†

Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries∗ Carmit Hazay† Yehuda Lindell†

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2014-09-16 05:37:56
12Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries∗ Carmit Hazay† Yehuda Lindell†

Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries∗ Carmit Hazay† Yehuda Lindell†

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2014-09-16 05:37:56
13BRICS RSBogetoft et al.: Secure Computing, Economy, and Trust: A Generic Solution for Secure Auctions  BRICS Basic Research in Computer Science

BRICS RSBogetoft et al.: Secure Computing, Economy, and Trust: A Generic Solution for Secure Auctions BRICS Basic Research in Computer Science

Add to Reading List

Source URL: www.brics.dk

Language: English - Date: 2005-06-06 07:42:15
14Complete Fairness in Secure Two-Party Computation S. Dov Gordon∗ Carmit Hazay†  Jonathan Katz‡

Complete Fairness in Secure Two-Party Computation S. Dov Gordon∗ Carmit Hazay† Jonathan Katz‡

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2014-09-16 05:31:04
15BRICS RSBRICS Basic Research in Computer Science

BRICS RSBRICS Basic Research in Computer Science

Add to Reading List

Source URL: www.brics.dk

Language: English - Date: 2004-12-08 06:09:18
16A Probabilistic Analysis of Onion Routing in a Black-box Model JOAN FEIGENBAUM, Yale University AARON JOHNSON, U.S. Naval Research Laboratory PAUL SYVERSON, U.S. Naval Research Laboratory

A Probabilistic Analysis of Onion Routing in a Black-box Model JOAN FEIGENBAUM, Yale University AARON JOHNSON, U.S. Naval Research Laboratory PAUL SYVERSON, U.S. Naval Research Laboratory

Add to Reading List

Source URL: www.ohmygodel.com

Language: English - Date: 2012-07-09 20:58:21
17Provably Secure and Practical Onion Routing Michael Backes Ian Goldberg  Saarland University and MPI-SWS, Germany

Provably Secure and Practical Onion Routing Michael Backes Ian Goldberg Saarland University and MPI-SWS, Germany

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-03-20 11:08:29
18Provably Secure and Practical Onion Routing Michael Backes Ian Goldberg Aniket Kate Esfandiar Mohammadi Saarland University and MPI-SWS University of Waterloo

Provably Secure and Practical Onion Routing Michael Backes Ian Goldberg Aniket Kate Esfandiar Mohammadi Saarland University and MPI-SWS University of Waterloo

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2012-04-29 17:48:07
19Universally Composable Security: A New Paradigm for Cryptographic Protocols∗ Ran Canetti† July 16, 2013  Abstract

Universally Composable Security: A New Paradigm for Cryptographic Protocols∗ Ran Canetti† July 16, 2013 Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-07-16 22:00:04
20Information-Theoretically Secure Protocols and Security Under Composition∗ Eyal Kushilevitz† Department of Computer Science Technion Israel Institute of Technology Haifa 32000, Israel.

Information-Theoretically Secure Protocols and Security Under Composition∗ Eyal Kushilevitz† Department of Computer Science Technion Israel Institute of Technology Haifa 32000, Israel.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-20 09:14:45