Search results for: Tal Malkin
Designs, Codes and Cryptography > 2018 > 86 > 3 > 641-663
Journal of Cryptology > 2018 > 31 > 1 > 172-201
Lecture Notes in Computer Science > Advances in Cryptology – ASIACRYPT 2009 > Multi Party Computation > 287-302
Lecture Notes in Computer Science > Advances in Cryptology – ASIACRYPT 2007 > Multiparty Computation I > 298-314
Lecture Notes in Computer Science > Automata, Languages and Programming > Secure Computation > 927-938
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO 2000 > Privacy for Databases > 55-73
Lecture Notes in Computer Science > Security Protocols > 218-232
Lecture Notes in Computer Science > Advances in Cryptology – ASIACRYPT 2009 > Multi Party Computation > 268-286
Lecture Notes in Computer Science > Advances in Cryptology — EUROCRYPT 2001 > Multiparty Protocols > 262-279
Lecture Notes in Computer Science > Randomization and Approximation Techniques in Computer Science > Regular Papers > 200-217
Lecture Notes in Computer Science > Advances in Cryptology — EUROCRYPT ’99 > Broadcast and Multicast > 459-474
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO’ 99 > Secure Communication and Computation > 80-97
Lecture Notes in Computer Science > Theory of Cryptography > Private Approximation and Black-Box Reductions > 434-455
Lecture Notes in Computer Science > Theory of Cryptography > Universally-Composible Security > 343-359