Search results for: Yuval Ishai
Lecture Notes in Computer Science > Advances in Cryptology – CRYPTO 2011 > Oblivious Transfer and Secret Sharing > 667-684
Lecture Notes in Computer Science > Advances in Cryptology - ASIACRYPT 2010 > Secure Communication and Computation > 466-482
Lecture Notes in Computer Science > Advances in Cryptology – CRYPTO 2010 > Multiparty Computation > 577-594
Lecture Notes in Computer Science > Automata, Languages and Programming > Session 2-Track A2. Security > 152-163
Journal of Cryptology > 2018 > 31 > 1 > 1-22
Lecture Notes in Computer Science > Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques > Contributed Talks of RANDOM > 311-325
Lecture Notes in Computer Science > Automata, Languages and Programming > Secure Computation > 927-938
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO 2000 > Privacy for Databases > 55-73
Lecture Notes in Computer Science > Advances in Cryptology – EUROCRYPT 2010 > Multiparty Protocols > 445-465
Lecture Notes in Computer Science > Advances in Cryptology – EUROCRYPT 2011 > Secure Computation > 406-425
Lecture Notes in Computer Science > Advances in Cryptology — EUROCRYPT 2001 > Multiparty Protocols > 262-279