Threshold Cryptography as a Service (in the Multiserver and YOSO Models) | 0 | 0.34 | 2022 |
Incremental Offline/Online PIR | 0 | 0.34 | 2022 |
Falcon: Honest-Majority Maliciously Secure Framework for Private Deep Learning. | 1 | 0.35 | 2021 |
Incremental Offline/Online PIR (extended version). | 0 | 0.34 | 2021 |
Gage MPC: Bypassing Residual Function Leakage for Non-Interactive MPC. | 0 | 0.34 | 2021 |
Yoso: You Only Speak Once Secure Mpc With Stateless Ephemeral Roles | 0 | 0.34 | 2021 |
Cryptography for #MeToo. | 0 | 0.34 | 2019 |
Best Possible Information-Theoretic Mpc | 0 | 0.34 | 2018 |
On the Local Leakage Resilience of Linear Secret Sharing Schemes. | 1 | 0.35 | 2018 |
Privacy-Preserving Search of Similar Patients in Genomic Data. | 5 | 0.45 | 2018 |
Robust Non-Interactive Multiparty Computation Against Constant-Size Collusion. | 5 | 0.45 | 2017 |
Secure Two-Party Computation with Fairness - A Necessary Design Principle. | 1 | 0.36 | 2017 |
Attribute-based Key Exchange with General Policies. | 2 | 0.36 | 2016 |
Towards a Privacy Research Roadmap for the Computing Community. | 2 | 0.48 | 2016 |
Secure Multiparty Computation With General Interaction Patterns | 7 | 0.48 | 2016 |
Protecting Circuits from Computationally Bounded and Noisy Leakage. | 3 | 0.38 | 2014 |
A full characterization of functions that imply fair coin tossing and ramifications to fairness | 31 | 1.16 | 2013 |
Efficient RSA key generation and threshold paillier in the two-party setting | 30 | 0.94 | 2012 |
Perfectly-secure multiplication for any t n/3 | 6 | 0.46 | 2011 |
Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings | 74 | 5.69 | 2010 |
On Compression of Data Encrypted With Block Ciphers | 12 | 0.70 | 2010 |
Secure network coding over the integers | 82 | 2.23 | 2010 |
Designing a side channel resistant random number generator | 4 | 0.49 | 2010 |
Okamoto-Tanaka revisited: fully authenticated diffie-hellman with minimal overhead | 26 | 0.92 | 2010 |
Protecting circuits from leakage: the computationally-bounded and noisy cases | 78 | 2.92 | 2010 |
The Round Complexity of Verifiable Secret Sharing Revisited | 33 | 0.98 | 2009 |
Information-Theoretically Secure Protocols and Security under Composition | 40 | 1.43 | 2009 |
Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs | 24 | 1.09 | 2008 |
Threshold RSA for dynamic and ad-hoc groups | 19 | 0.73 | 2008 |
Degradation and amplification of computational hardness | 9 | 0.48 | 2008 |
Robust and Efficient Sharing of RSA Functions | 109 | 12.22 | 2007 |
Secure Computation Without Authentication | 61 | 2.28 | 2007 |
On the composition of authenticated Byzantine Agreement | 32 | 1.56 | 2006 |
Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings | 27 | 5.52 | 2006 |
Protocol Initialization for the Framework of Universal Composability | 21 | 0.95 | 2004 |
Secure Hashed Diffie-Hellman over Non-DDH Groups. | 25 | 1.84 | 2004 |
Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes | 80 | 4.54 | 2004 |
Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering | 104 | 4.02 | 2004 |
Secure applications of Pedersen's distributed key generation protocol | 21 | 0.84 | 2003 |
Universal Composition with Joint State. | 88 | 3.60 | 2002 |
Sequential composition of protocols without simultaneous termination | 9 | 0.57 | 2002 |
On 2-Round Secure Multiparty Computation | 15 | 0.91 | 2002 |
On the Security of Joint Signature and Encryption | 257 | 13.15 | 2002 |
The round complexity of verifiable secret sharing and secure multicast | 65 | 2.60 | 2001 |
Fair e-Lotteries and e-Casinos | 14 | 1.14 | 2001 |
Robust threshold DSS signatures | 222 | 18.87 | 2001 |
Chameleon Signatures | 25 | 2.13 | 2000 |
RSA-Based Undeniable Signatures | 45 | 2.73 | 2000 |
Secure distributed storage and retrieval | 53 | 6.09 | 2000 |
A Cryptographic Solution to a Game Theoretic Problem | 69 | 3.95 | 2000 |