Search results for: Benny Pinkas
Journal of Cryptology > 2019 > 32 > 3 > 1026-1069
Journal of Cryptology > 2018 > 31 > 3 > 798-844
IEEE Security & Privacy > 2017 > 15 > 6 > 61 - 67
IEEE Security & Privacy > 2016 > 14 > 5 > 48 - 56
Lecture Notes in Computer Science > Fun with Algorithms > 166-182
Lecture Notes in Computer Science > Advances in Cryptology – CRYPTO 2010 > Computation Delegation and Obfuscation > 502-519
Lecture Notes in Computer Science > Topics in Cryptology – CT-RSA 2011 > Secure Two-Party Computation > 1-16
Lecture Notes in Computer Science > Advances in Cryptology — EUROCRYPT 2003 > Secure Multi-party Computation I > 87-105
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO’ 99 > Protocols and Broadcasting > 573-590
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Secure Computation > 107-124
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO 2000 > Privacy for Databases > 36-54
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Privacy and Anonymity > 420-437
Lecture Notes in Computer Science > Advances in Cryptology – CRYPTO 2011 > Outsourcing and Delegating Computation > 132-150
Lecture Notes in Computer Science > Security and Privacy in Digital Rights Management > Cryptographic Techniques, Fingerprinting > 40-56
Lecture Notes in Computer Science > Advances in Cryptology - EUROCRYPT 2004 > Private Computation > 1-19
Lecture Notes in Computer Science > Advances in Cryptology – CRYPTO 2011 > Secure Computation > 259-276