|
Conferences in DBLP
An Optimally Fair Coin Toss. [Citation Graph (, )][DBLP]
Complete Fairness in Multi-party Computation without an Honest Majority. [Citation Graph (, )][DBLP]
Fairness with an Honest Minority and a Rational Majority. [Citation Graph (, )][DBLP]
Purely Rational Secret Sharing (Extended Abstract). [Citation Graph (, )][DBLP]
Some Recent Progress in Lattice-Based Cryptography. [Citation Graph (, )][DBLP]
Non-malleable Obfuscation. [Citation Graph (, )][DBLP]
Simulation-Based Concurrent Non-malleable Commitments and Decommitments. [Citation Graph (, )][DBLP]
Proofs of Retrievability via Hardness Amplification. [Citation Graph (, )][DBLP]
Security Amplification for InteractiveCryptographic Primitives. [Citation Graph (, )][DBLP]
Composability and On-Line Deniability of Authentication. [Citation Graph (, )][DBLP]
Authenticated Adversarial Routing. [Citation Graph (, )][DBLP]
Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer. [Citation Graph (, )][DBLP]
On the (Im)Possibility of Key Dependent Encryption. [Citation Graph (, )][DBLP]
On the (Im)Possibility of Arthur-Merlin Witness Hiding Protocols. [Citation Graph (, )][DBLP]
Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security. [Citation Graph (, )][DBLP]
Complexity of Multi-party Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation. [Citation Graph (, )][DBLP]
Realistic Failures in Secure Multi-party Computation. [Citation Graph (, )][DBLP]
Secure Arithmetic Computation with No Honest Majority. [Citation Graph (, )][DBLP]
Universally Composable Multiparty Computation with Partially Isolated Parties. [Citation Graph (, )][DBLP]
Oblivious Transfer from Weak Noisy Channels. [Citation Graph (, )][DBLP]
Composing Quantum Protocols in a Classical Environment. [Citation Graph (, )][DBLP]
LEGO for Two-Party Secure Computation. [Citation Graph (, )][DBLP]
Simple, Black-Box Constructions of Adaptively Secure Protocols. [Citation Graph (, )][DBLP]
Black-Box Constructions of Two-Party Protocols from One-Way Functions. [Citation Graph (, )][DBLP]
Chosen-Ciphertext Security via Correlated Products. [Citation Graph (, )][DBLP]
Hierarchical Identity Based Encryption with Polynomially Many Levels. [Citation Graph (, )][DBLP]
Predicate Privacy in Encryption Systems. [Citation Graph (, )][DBLP]
Simultaneous Hardcore Bits and Cryptography against Memory Attacks. [Citation Graph (, )][DBLP]
The Differential Privacy Frontier (Extended Abstract). [Citation Graph (, )][DBLP]
How Efficient Can Memory Checking Be?. [Citation Graph (, )][DBLP]
Goldreich's One-Way Function Candidate and Myopic Backtracking Algorithms. [Citation Graph (, )][DBLP]
Secret Sharing and Non-Shannon Information Inequalities. [Citation Graph (, )][DBLP]
Weak Verifiable Random Functions. [Citation Graph (, )][DBLP]
Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection. [Citation Graph (, )][DBLP]
Towards a Theory of Extractable Functions. [Citation Graph (, )][DBLP]
|