Gordon, S. Dov; Ranellucci, Samuel; Wang, Xiao Secure computation with low communication from cross-checking. (English) Zbl 1447.94041 Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 11274, 59-85 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{S. D. Gordon} et al., Lect. Notes Comput. Sci. 11274, 59--85 (2018; Zbl 1447.94041) Full Text: DOI
Debris-Alazard, Thomas; Tillich, Jean-Pierre Two attacks on rank metric code-based schemes: RankSign and an IBE scheme. (English) Zbl 1446.94124 Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11272, 62-92 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{T. Debris-Alazard} and \textit{J.-P. Tillich}, Lect. Notes Comput. Sci. 11272, 62--92 (2018; Zbl 1446.94124) Full Text: DOI arXiv HAL
Narayanan, Varun; Prabahakaran, Vinod M. Oblivious transfer in incomplete networks. (English) Zbl 1443.94075 Beimel, Amos (ed.) et al., Theory of cryptography. 16th international conference, TCC 2018, Panaji, India, November 11–14, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11239, 389-418 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{V. Narayanan} and \textit{V. M. Prabahakaran}, Lect. Notes Comput. Sci. 11239, 389--418 (2018; Zbl 1443.94075) Full Text: DOI
Khurana, Dakshita; Ostrovsky, Rafail; Srinivasan, Akshayaram Round optimal black-box “commit-and-prove”. (English) Zbl 1443.94067 Beimel, Amos (ed.) et al., Theory of cryptography. 16th international conference, TCC 2018, Panaji, India, November 11–14, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11239, 286-313 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Khurana} et al., Lect. Notes Comput. Sci. 11239, 286--313 (2018; Zbl 1443.94067) Full Text: DOI
Garg, Sanjam; Ishai, Yuval; Srinivasan, Akshayaram Two-round MPC: information-theoretic and black-box. (English) Zbl 1443.94058 Beimel, Amos (ed.) et al., Theory of cryptography. 16th international conference, TCC 2018, Panaji, India, November 11–14, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11239, 123-151 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Garg} et al., Lect. Notes Comput. Sci. 11239, 123--151 (2018; Zbl 1443.94058) Full Text: DOI
Rosulek, Mike; Shirley, Morgan On the structure of unconditional UC hybrid protocols. (English) Zbl 1430.94087 Beimel, Amos (ed.) et al., Theory of cryptography. 16th international conference, TCC 2018, Panaji, India, November 11–14, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11240, 98-126 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Rosulek} and \textit{M. Shirley}, Lect. Notes Comput. Sci. 11240, 98--126 (2018; Zbl 1430.94087) Full Text: DOI
Block, Alexander R.; Gupta, Divya; Maji, Hemanta K.; Nguyen, Hai H. Secure computation using leaky correlations (asymptotically optimal constructions). (English) Zbl 1430.94058 Beimel, Amos (ed.) et al., Theory of cryptography. 16th international conference, TCC 2018, Panaji, India, November 11–14, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11240, 36-65 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{A. R. Block} et al., Lect. Notes Comput. Sci. 11240, 36--65 (2018; Zbl 1430.94058) Full Text: DOI
Unruh, Dominique Everlasting multi-party computation. (English) Zbl 1442.94047 J. Cryptology 31, No. 4, 965-1011 (2018). MSC: 94A60 81P94 PDFBibTeX XMLCite \textit{D. Unruh}, J. Cryptology 31, No. 4, 965--1011 (2018; Zbl 1442.94047) Full Text: DOI
Damgård, Ivan; Orlandi, Claudio; Simkin, Mark Yet another compiler for active security or: efficient MPC over arbitrary rings. (English) Zbl 1436.94050 Shacham, Hovav (ed.) et al., Advances in cryptology – CRYPTO 2018. 38th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10992, 799-829 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{I. Damgård} et al., Lect. Notes Comput. Sci. 10992, 799--829 (2018; Zbl 1436.94050) Full Text: DOI
Dinur, Itai An improved affine equivalence algorithm for random permutations. (English) Zbl 1423.94067 Nielsen, Jesper Buus (ed.) et al., Advances in cryptology – EUROCRYPT 2018. 37th annual international conference on the theory and applications of cryptographic techniques, Tel Aviv, Israel, April 29 – May 3, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10820, 413-442 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{I. Dinur}, Lect. Notes Comput. Sci. 10820, 413--442 (2018; Zbl 1423.94067) Full Text: DOI
Hazay, Carmit Oblivious polynomial evaluation and secure set-intersection from algebraic PRFs. (English) Zbl 1444.94069 J. Cryptology 31, No. 2, 537-586 (2018). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{C. Hazay}, J. Cryptology 31, No. 2, 537--586 (2018; Zbl 1444.94069) Full Text: DOI
Fujisaki, Eiichiro All-but-many encryption. (English) Zbl 1426.94100 J. Cryptology 31, No. 1, 226-275 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{E. Fujisaki}, J. Cryptology 31, No. 1, 226--275 (2018; Zbl 1426.94100) Full Text: DOI