## Found 89 Documents (Results 1–89)

Full Text:

### Secure non-interactive reduction and spectral analysis of correlations. (English)Zbl 1496.94023

Dunkelman, Orr (ed.) et al., Advances in cryptology – EUROCRYPT 2022. 41st annual international conference on the theory and applications of cryptographic techniques, Trondheim, Norway, May 30 – June 3, 2022. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13277, 797-827 (2022).
MSC:  94A60 94A05
Full Text:

### Indistinguishability obfuscation from LPN over $$\mathbb{F}_p$$, DLIN, and PRGs in $$NC^0$$. (English)Zbl 1496.94052

Dunkelman, Orr (ed.) et al., Advances in cryptology – EUROCRYPT 2022. 41st annual international conference on the theory and applications of cryptographic techniques, Trondheim, Norway, May 30 – June 3, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13275, 670-699 (2022).
MSC:  94A60 68P25
Full Text:

### Round-optimal multi-party computation with identifiable abort. (English)Zbl 1496.94035

Dunkelman, Orr (ed.) et al., Advances in cryptology – EUROCRYPT 2022. 41st annual international conference on the theory and applications of cryptographic techniques, Trondheim, Norway, May 30 – June 3, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13275, 335-364 (2022).
MSC:  94A60
Full Text:

### Asymptotically quasi-optimal cryptography. (English)Zbl 1496.94039

Dunkelman, Orr (ed.) et al., Advances in cryptology – EUROCRYPT 2022. 41st annual international conference on the theory and applications of cryptographic techniques, Trondheim, Norway, May 30 – June 3, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13275, 303-334 (2022).
MSC:  94A60
Full Text:

### Guaranteed output in $$O(\sqrt{n})$$ rounds for round-robin sampling protocols. (English)Zbl 1497.94081

Dunkelman, Orr (ed.) et al., Advances in cryptology – EUROCRYPT 2022. 41st annual international conference on the theory and applications of cryptographic techniques, Trondheim, Norway, May 30 – June 3, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13275, 241-271 (2022).
MSC:  94A60 68P25
Full Text:

### Round-optimal black-box protocol compilers. (English)Zbl 1499.68118

Dunkelman, Orr (ed.) et al., Advances in cryptology – EUROCRYPT 2022. 41st annual international conference on the theory and applications of cryptographic techniques, Trondheim, Norway, May 30 – June 3, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13275, 210-240 (2022).
MSC:  68Q10 68N20 94A60
Full Text:

### Round-optimal and communication-efficient multiparty computation. (English)Zbl 1497.68210

Dunkelman, Orr (ed.) et al., Advances in cryptology – EUROCRYPT 2022. 41st annual international conference on the theory and applications of cryptographic techniques, Trondheim, Norway, May 30 – June 3, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13275, 65-95 (2022).
Full Text:

MSC:  94A60
Full Text:

### From fairness to full security in multiparty computation. (English)Zbl 1486.94091

Reviewer: Aaron Lye (Bremen)
MSC:  94A60
Full Text:

### Secure multiparty computation in the bounded storage model. (English)Zbl 1490.68070

Paterson, Maura B. (ed.), Cryptography and coding. 18th IMA international conference, IMACC 2021, virtual event, December 14–15, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13129, 289-325 (2021).
Full Text:

### MPC-in-multi-heads: a multi-prover zero-knowledge proof system (or: how to jointly prove any NP statements in ZK). (English)Zbl 1498.68111

Bertino, Elisa (ed.) et al., Computer security – ESORICS 2021. 26th European symposium on research in computer security, Darmstadt, Germany, October 4–8, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12973, 332-351 (2021).
MSC:  68Q10 94A60
Full Text:

### Towards a unified approach to black-box constructions of zero-knowledge proofs. (English)Zbl 1489.94103

Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 12828, 34-64 (2021).
MSC:  94A60
Full Text:

### On the round complexity of black-box secure MPC. (English)Zbl 1486.94111

Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12826, 214-243 (2021).
MSC:  94A60 68M12 68M14
Full Text:

### Three-round secure multiparty computation from black-box two-round oblivious transfer. (English)Zbl 1487.94136

Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12826, 185-213 (2021).
MSC:  94A60 68M14 68M12
Full Text:

### One-way functions imply secure computation in a quantum world. (English)Zbl 1487.81036

Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12825, 467-496 (2021).
Full Text:

### Function secret sharing for mixed-mode and fixed-point secure computation. (English)Zbl 1479.94297

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2021. 40th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, October 17–21, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12697, 871-900 (2021).
MSC:  94A62 94A60
Full Text:

### Generic compiler for publicly verifiable covert multi-party computation. (English)Zbl 07440627

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2021. 40th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, October 17–21, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12697, 782-811 (2021).
MSC:  68N20 68P25 94A60
Full Text:

### Oblivious transfer is in MiniQCrypt. (English)Zbl 1479.94182

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2021. 40th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, October 17–21, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12697, 531-561 (2021).
MSC:  94A60 81P45 81P94
Full Text:

MSC:  68Qxx
Full Text:

### Efficient, actively secure MPC with a dishonest majority: a survey. (English)Zbl 07405934

Bajard, Jean Claude (ed.) et al., Arithmetic of finite fields. 8th international workshop, WAIFI 2020, Rennes, France, July 6–8, 2020. Revised selected and invited papers. Cham: Springer. Lect. Notes Comput. Sci. 12542, 42-71 (2021).
Full Text:

### On the exact round complexity of secure three-party computation. (English)Zbl 1472.94059

MSC:  94A60 94A62
Full Text:

### High-performance multi-party computation for binary circuits based on oblivious transfer. (English)Zbl 1470.94080

MSC:  94A60 94A62
Full Text:

### Round-preserving parallel composition of probabilistic-termination cryptographic protocols. (English)Zbl 07363725

MSC:  68M14 94A60 94A62
Full Text:

### The price of active security in cryptographic protocols. (English)Zbl 1493.94034

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12106, 184-215 (2020).
MSC:  94A60 68P25 68N20
Full Text:

### Going beyond dual execution: MPC for functions with efficient verification. (English)Zbl 07436977

Kiayias, Aggelos (ed.) et al., Public-key cryptography – PKC 2020. 23rd IACR international conference on practice and theory of public-key cryptography, Edinburgh, UK, May 4–7, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12111, 328-356 (2020).
MSC:  68P25 94A62 94A60
Full Text:

Full Text:

### Computing boundary cycle of a pseudo-triangle polygon from its visibility graph. (English)Zbl 07316483

Barbosa, Luís Soares (ed.) et al., Topics in theoretical computer science. Third IFIP WG 1.8 international conference, TTCS 2020, Tehran, Iran, July 1–2, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12281, 61-71 (2020).
MSC:  68Qxx 68R10 68U05
Full Text:

MSC:  94A60
Full Text:

### Feasibility and infeasibility of secure computation with malicious PUFs. (English)Zbl 1455.94146

MSC:  94A60 94A62
Full Text:

### Constant-round maliciously secure two-party computation in the RAM model. (English)Zbl 1435.94131

MSC:  94A60 68P25
Full Text:

MSC:  94A60
Full Text:

MSC:  94A60
Full Text:

MSC:  94A60
Full Text:

### (Efficient) universally composable oblivious transfer using a minimal number of stateless tokens. (English)Zbl 1434.94062

MSC:  94A60 68M12
Full Text:

MSC:  94A60
Full Text:

### Secure computation with low communication from cross-checking. (English)Zbl 1447.94041

Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 11274, 59-85 (2018).
MSC:  94A60
Full Text:

### Two attacks on rank metric code-based schemes: RankSign and an IBE scheme. (English)Zbl 1446.94124

Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11272, 62-92 (2018).
MSC:  94A60
Full Text:

### Oblivious transfer in incomplete networks. (English)Zbl 1443.94075

Beimel, Amos (ed.) et al., Theory of cryptography. 16th international conference, TCC 2018, Panaji, India, November 11–14, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11239, 389-418 (2018).
MSC:  94A60
Full Text:

### Round optimal black-box “commit-and-prove”. (English)Zbl 1443.94067

Beimel, Amos (ed.) et al., Theory of cryptography. 16th international conference, TCC 2018, Panaji, India, November 11–14, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11239, 286-313 (2018).
MSC:  94A60
Full Text:

### Two-round MPC: information-theoretic and black-box. (English)Zbl 1443.94058

Beimel, Amos (ed.) et al., Theory of cryptography. 16th international conference, TCC 2018, Panaji, India, November 11–14, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11239, 123-151 (2018).
MSC:  94A60
Full Text:

### On the structure of unconditional UC hybrid protocols. (English)Zbl 1430.94087

Beimel, Amos (ed.) et al., Theory of cryptography. 16th international conference, TCC 2018, Panaji, India, November 11–14, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11240, 98-126 (2018).
MSC:  94A60
Full Text:

### Secure computation using leaky correlations (asymptotically optimal constructions). (English)Zbl 1430.94058

Beimel, Amos (ed.) et al., Theory of cryptography. 16th international conference, TCC 2018, Panaji, India, November 11–14, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11240, 36-65 (2018).
MSC:  94A60
Full Text:

### Everlasting multi-party computation. (English)Zbl 1442.94047

MSC:  94A60 81P94
Full Text:

### Yet another compiler for active security or: efficient MPC over arbitrary rings. (English)Zbl 1436.94050

Shacham, Hovav (ed.) et al., Advances in cryptology – CRYPTO 2018. 38th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10992, 799-829 (2018).
MSC:  94A60
Full Text:

### An improved affine equivalence algorithm for random permutations. (English)Zbl 1423.94067

Nielsen, Jesper Buus (ed.) et al., Advances in cryptology – EUROCRYPT 2018. 37th annual international conference on the theory and applications of cryptographic techniques, Tel Aviv, Israel, April 29 – May 3, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10820, 413-442 (2018).
MSC:  94A60
Full Text:

### Oblivious polynomial evaluation and secure set-intersection from algebraic PRFs. (English)Zbl 1444.94069

MSC:  94A60 68P25
Full Text:

MSC:  94A60
Full Text:

MSC:  94A60
Full Text:

### Non-interactive secure 2PC in the offline/online and batch settings. (English)Zbl 1415.94451

Coron, Jean-Sébastien (ed.) et al., Advances in cryptology – EUROCRYPT 2017. 36th annual international conference on the theory and applications of cryptographic techniques, Paris, France, April 30 – May 4, 2017. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 10212, 425-455 (2017).
MSC:  94A60
Full Text:

### Robust transforming combiners from indistinguishability obfuscation to functional encryption. (English)Zbl 1410.94039

Coron, Jean-Sébastien (ed.) et al., Advances in cryptology – EUROCRYPT 2017. 36th annual international conference on the theory and applications of cryptographic techniques, Paris, France, April 30 – May 4, 2017. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10210, 91-121 (2017).
MSC:  94A60
Full Text:

### Scalable multi-party private set-intersection. (English)Zbl 1404.94080

Fehr, Serge (ed.), Public-key cryptography – PKC 2017. 20th IACR international conference on practice and theory in public-key cryptography, Amsterdam, The Netherlands, March 28–31, 2017. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-54364-1/pbk; 978-3-662-54365-8/ebook). Lecture Notes in Computer Science 10174, 175-203 (2017).
MSC:  94A60
Full Text:

### Constant round adaptively secure protocols in the tamper-proof hardware model. (English)Zbl 1400.94149

Fehr, Serge (ed.), Public-key cryptography – PKC 2017. 20th IACR international conference on practice and theory in public-key cryptography, Amsterdam, The Netherlands, March 28–31, 2017. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-54387-0/pbk; 978-3-662-54388-7/ebook). Lecture Notes in Computer Science 10175, 428-460 (2017).
MSC:  94A60
Full Text:

### On the computational overhead of MPC with dishonest majority. (English)Zbl 1400.94167

Fehr, Serge (ed.), Public-key cryptography – PKC 2017. 20th IACR international conference on practice and theory in public-key cryptography, Amsterdam, The Netherlands, March 28–31, 2017. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-54387-0/pbk; 978-3-662-54388-7/ebook). Lecture Notes in Computer Science 10175, 369-395 (2017).
MSC:  94A60
Full Text:

### Efficient one-sided adaptively secure computation. (English)Zbl 1370.94517

MSC:  94A60 68P25
Full Text:

### Reactive garbling: foundation, instantiation, application. (English)Zbl 1407.94145

Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4-8, 2016. Proceedings. Part II. Berlin: Springer. Lect. Notes Comput. Sci. 10032, 1022-1052 (2016).
MSC:  94A60
Full Text:

### More efficient constant-round multi-party computation from BMR and SHE. (English)Zbl 1406.94071

Hirt, Martin (ed.) et al., Theory of cryptography. 14th international conference, TCC 2016-B, Beijing, China, October 31 – November 3, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53640-7/pbk; 978-3-662-53641-4/ebook). Lecture Notes in Computer Science 9985, 554-581 (2016).
MSC:  94A60
Full Text:

### Constant-round maliciously secure two-party computation in the RAM model. (English)Zbl 1406.94062

Hirt, Martin (ed.) et al., Theory of cryptography. 14th international conference, TCC 2016-B, Beijing, China, October 31 – November 3, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53640-7/pbk; 978-3-662-53641-4/ebook). Lecture Notes in Computer Science 9985, 521-553 (2016).
MSC:  94A60 68P25
Full Text:

### Secure multiparty RAM computation in constant rounds. (English)Zbl 1406.94055

Hirt, Martin (ed.) et al., Theory of cryptography. 14th international conference, TCC 2016-B, Beijing, China, October 31 – November 3, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53640-7/pbk; 978-3-662-53641-4/ebook). Lecture Notes in Computer Science 9985, 491-520 (2016).
MSC:  94A60 68P25
Full Text:

### Composable adaptive secure protocols without setup under polytime assumptions. (English)Zbl 1406.94061

Hirt, Martin (ed.) et al., Theory of cryptography. 14th international conference, TCC 2016-B, Beijing, China, October 31 – November 3, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53640-7/pbk; 978-3-662-53641-4/ebook). Lecture Notes in Computer Science 9985, 400-432 (2016).
MSC:  94A60
Full Text:

### Composable security in the tamper-proof hardware model under minimal complexity. (English)Zbl 1406.94060

Hirt, Martin (ed.) et al., Theory of cryptography. 14th international conference, TCC 2016-B, Beijing, China, October 31 – November 3, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53640-7/pbk; 978-3-662-53641-4/ebook). Lecture Notes in Computer Science 9985, 367-399 (2016).
MSC:  94A60
Full Text:

### Binary AMD circuits from secure multiparty computation. (English)Zbl 1406.94057

Hirt, Martin (ed.) et al., Theory of cryptography. 14th international conference, TCC 2016-B, Beijing, China, October 31 – November 3, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53640-7/pbk; 978-3-662-53641-4/ebook). Lecture Notes in Computer Science 9985, 336-366 (2016).
MSC:  94A60
Full Text:

### Probabilistic termination and composability of cryptographic protocols. (English)Zbl 1406.94040

Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part III. Berlin: Springer (ISBN 978-3-662-53014-6/pbk; 978-3-662-53015-3/ebook). Lecture Notes in Computer Science 9816, 240-269 (2016).
MSC:  94A60
Full Text:

### Rate-1, linear time and additively homomorphic UC commitments. (English)Zbl 1406.94035

Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part III. Berlin: Springer (ISBN 978-3-662-53014-6/pbk; 978-3-662-53015-3/ebook). Lecture Notes in Computer Science 9816, 179-207 (2016).
MSC:  94A60
Full Text:

### Secure protocol transformations. (English)Zbl 1372.94430

Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-53007-8/pbk; 978-3-662-53008-5/ebook). Lecture Notes in Computer Science 9815, 430-458 (2016).
MSC:  94A60 68P25
Full Text:

### On the power of secure two-party computation. (English)Zbl 1372.94429

Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-53007-8/pbk; 978-3-662-53008-5/ebook). Lecture Notes in Computer Science 9815, 397-429 (2016).
MSC:  94A60 68P25 68M12
Full Text:

### Network oblivious transfer. (English)Zbl 1391.94772

Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-53007-8/pbk; 978-3-662-53008-5/ebook). Lecture Notes in Computer Science 9815, 366-396 (2016).
MSC:  94A60 68M12
Full Text:

### On adaptively secure multiparty computation with a short CRS. (English)Zbl 1400.94182

Zikas, Vassilis (ed.) et al., Security and cryptography for networks. 10th international conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-44617-2/pbk; 978-3-319-44618-9/ebook). Lecture Notes in Computer Science 9841, 129-146 (2016).
MSC:  94A62 68Q10
Full Text:

### Adaptive hardness and composable security in the plain model from standard assumptions. (English)Zbl 1406.94033

MSC:  94A60 68P25
Full Text:

### Secret sharing schemes with algebraic properties and applications. (English)Zbl 1479.94301

Beckmann, Arnold (ed.) et al., Pursuit of the universal. 12th conference on computability in Europe, CiE 2016, Paris, France, June 27 – July 1, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9709, 68-77 (2016).
MSC:  94A62
Full Text:

MSC:  94A60
Full Text:

### On the complexity of additively homomorphic UC commitments. (English)Zbl 1388.94055

Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49095-2/pbk; 978-3-662-49096-9/ebook). Lecture Notes in Computer Science 9562, 542-565 (2016).
MSC:  94A60
Full Text:

### Encoding functions with constant online rate, or how to compress garbled circuit keys. (English)Zbl 1362.94016

MSC:  94A60 68P25
Full Text:

### Actively secure OT extension with optimal overhead. (English)Zbl 1375.94138

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 724-741 (2015).
MSC:  94A60
Full Text:

### Incoercible multi-party computation and universally composable receipt-free voting. (English)Zbl 1352.94024

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). Lecture Notes in Computer Science 9216, 763-780 (2015).
MSC:  94A60 68P25 68M12
Full Text:

### Efficient multi-party computation: from passive to active security via secure SIMD circuits. (English)Zbl 1352.94037

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). Lecture Notes in Computer Science 9216, 721-741 (2015).
MSC:  94A60 68P25 94C99
Full Text:

### Secure computation from leaky correlated randomness. (English)Zbl 1352.94038

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). Lecture Notes in Computer Science 9216, 701-720 (2015).
MSC:  94A60 68Q87
Full Text:

### Round-optimal black-box two-party computation. (English)Zbl 1352.94056

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). Lecture Notes in Computer Science 9216, 339-358 (2015).
MSC:  94A60
Full Text:

### Cryptography with one-way communication. (English)Zbl 1351.94046

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). Lecture Notes in Computer Science 9216, 191-208 (2015).
MSC:  94A60
Full Text:

### A note on ramp secret sharing schemes from error-correcting codes. (English)Zbl 1286.94093

MSC:  94A62 94B25 94B05
Full Text:

### Efficient, adaptively secure, and composable oblivious transfer with a single, global CRS. (English)Zbl 1314.94061

Kurosawa, Kaoru (ed.) et al., Public-key cryptography – PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 73-88 (2013).
MSC:  94A60
Full Text:

Full Text:

### Multi-party computation with conversion of secret sharing. (English)Zbl 1234.68151

MSC:  68Q25 94A60 94A62
Full Text:

### Efficient secure two-party exponentiation. (English)Zbl 1284.94149

Kiayias, Aggelos (ed.), Topics in cryptology – CT-RSA 2011. The cryptographers’ track at the RSA conference 2011, San Francisco, CA, USA, February 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19073-5/pbk). Lecture Notes in Computer Science 6558, 17-32 (2011).
MSC:  94A62
Full Text:

MSC:  94A62
Full Text:

### Quantum cryptography. (English)Zbl 1190.81033

MSC:  81P94 81P45
Full Text:

### Founding cryptography on tamper-proof hardware tokens. (English)Zbl 1274.94072

Micciancio, Daniele (ed.), Theory of cryptography. 7th theory of cryptography conference, TCC 2010, Zurich, Switzerland, February 9–11, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11798-5/pbk). Lecture Notes in Computer Science 5978, 308-326 (2010).
MSC:  94A60
Full Text:

### On the necessary and sufficient assumptions for UC computation. (English)Zbl 1274.94060

Micciancio, Daniele (ed.), Theory of cryptography. 7th theory of cryptography conference, TCC 2010, Zurich, Switzerland, February 9–11, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11798-5/pbk). Lecture Notes in Computer Science 5978, 109-127 (2010).
MSC:  94A60
Full Text:

### On complete primitives for fairness. (English)Zbl 1274.94071

Micciancio, Daniele (ed.), Theory of cryptography. 7th theory of cryptography conference, TCC 2010, Zurich, Switzerland, February 9–11, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11798-5/pbk). Lecture Notes in Computer Science 5978, 91-108 (2010).
MSC:  94A60
Full Text:

all top 5

all top 5

all top 3

all top 3