1

A Note on Constant-Round Zero-Knowledge Proofs of Knowledge

Year:
2013
Language:
english
File:
PDF, 327 KB
english, 2013
4

A Proof of Security of Yao’s Protocol for Two-Party Computation

Year:
2009
Language:
english
File:
PDF, 450 KB
english, 2009
5

Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer

Year:
2011
Language:
english
File:
PDF, 512 KB
english, 2011
6

[Information Security and Cryptography] Efficient Secure Two-Party Protocols ||

Year:
2010
Language:
english
File:
PDF, 3.66 MB
english, 2010
7

[Information Security and Cryptography] Tutorials on the Foundations of Cryptography ||

Year:
2017
Language:
english
File:
PDF, 4.42 MB
english, 2017
9

Lower bounds for non-black-box zero knowledge

Year:
2006
Language:
english
File:
PDF, 728 KB
english, 2006
10

Secure Multi-Party Computation without Agreement

Year:
2005
Language:
english
File:
PDF, 362 KB
english, 2005
11

Session-Key Generation Using Human Passwords Only

Year:
2006
Language:
english
File:
PDF, 753 KB
english, 2006
13

A Simpler Construction of CCA2-Secure Public-Key Encryption under General Assumptions

Year:
2006
Language:
english
File:
PDF, 263 KB
english, 2006
14

Concurrent Composition of Secure Protocols in the Timing Model

Year:
2007
Language:
english
File:
PDF, 527 KB
english, 2007
15

General Composition and Universal Composability in

Year:
2009
Language:
english
File:
PDF, 461 KB
english, 2009
16

Handling Expected Polynomial-Time Strategies in

Year:
2008
Language:
english
File:
PDF, 602 KB
english, 2008
17

Impossibility Results for Universal Composability in

Year:
2011
Language:
english
File:
PDF, 412 KB
english, 2011
18

Lower Bounds and Impossibility Results for

Year:
2008
Language:
english
File:
PDF, 603 KB
english, 2008
20

Utility Dependence in Correct and Fair Rational Secret

Year:
2011
Language:
english
File:
PDF, 566 KB
english, 2011
21

Secure Computation Without Authentication

Year:
2011
Language:
english
File:
PDF, 545 KB
english, 2011
22

A Statistical Theory for Quantitative Association Rules

Year:
2003
Language:
english
File:
PDF, 187 KB
english, 2003
26

Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer

Year:
2012
Language:
english
File:
PDF, 618 KB
english, 2012
27

Strict Polynomial-Time in Simulation and Extraction

Year:
2004
Language:
english
File:
PDF, 339 KB
english, 2004
28

Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries

Year:
2010
Language:
english
File:
PDF, 767 KB
english, 2010
33

[Lecture Notes in Computer Science] Theory of Cryptography Volume 8349 ||

Year:
2014
Language:
english
File:
PDF, 8.11 MB
english, 2014
34

Fast Cut-and-Choose-Based Protocols for Malicious and Covert Adversaries

Year:
2016
Language:
english
File:
PDF, 683 KB
english, 2016
35

On the composition of authenticated Byzantine Agreement

Year:
2006
Language:
english
File:
PDF, 406 KB
english, 2006
42

Complete Fairness in Secure Two-Party Computation

Year:
2011
Language:
english
File:
PDF, 872 KB
english, 2011