Search results for: Kobbi Nissim
Lecture Notes in Computer Science > Automata, Languages and Programming > Secure Computation > 927-938
Lecture Notes in Computer Science > Theory of Cryptography > Secret Sharing and Multi-party Computation (II) > 522-541
Lecture Notes in Computer Science > Theory of Cryptography > Privacy > 265-284
Lecture Notes in Computer Science > Theory of Cryptography > Private Approximation and Black-Box Reductions > 383-403
Lecture Notes in Computer Science > Approximation Algorithms for Combinatorial Optimization > Contributed Talks > 120-131
Lecture Notes in Computer Science > Advances in Cryptology - EUROCRYPT 2004 > Private Computation > 1-19
Lecture Notes in Computer Science > Advances in Cryptology — EUROCRYPT ’99 > Broadcast and Multicast > 459-474
Lecture Notes in Computer Science > Advances in Cryptology – CRYPTO 2004 > Computationally Unbounded Adversaries > 528-544
Lecture Notes in Computer Science > Automata, Languages and Programming > Contributed Papers > 745-756
Journal of Cryptology > 2016 > 29 > 1 > 115-155
Journal of Computer and System Sciences > 2013 > 79 > 8 > 1322-1340
Machine Learning > 2014 > 94 > 3 > 401-437
Journal of Cryptology > 2012 > 25 > 3 > 383-433