Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Carmit Hazay
Search web for home page
Program Committees
1
2013
PKC
pc
2
2011
PKC
pc
3
2010
Crypto
pc
Publications
year
title
booktitle
pages
1
2012
Secure Two-Party Computation with Low Communication
tcc
54-74
2
2011
Towards a Game Theoretic View of Secure Computation
eurocrypt
426
3
2010
Computationally Secure Pattern Matching in the Presence of Malicious Adversaries
asiacrypt
195-212
4
2010
Text Search Protocols with Simulation Based Security
pkc
332-350
5
2010
Efficient Set Operations in the Presence of Malicious Adversaries
pkc
312-331
6
2010
Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
jofc
422-456
7
2009
Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
eprint
online
8
2009
Constructions of Truly Practical Secure Protocols using Standard Smartcards
eprint
online
9
2008
Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
tcc
155-175
10
2008
Complete Fairness in Secure Two-Party Computation
eprint
online
11
2007
Concurrently-Secure Blind Signatures Without Random Oracles or Setup Assumptions
tcc
323-341
Coauthors of Carmit Hazay
Gilad Asharov
Ran Canetti
Ivan Damgård
Sebastian Faust
Rosario Gennaro
S. Dov Gordon
Jonathan Katz
Chiu-Yuen Koo
Yehuda Lindell
Kobbi Nissim
Jeffrey S. Sorensen
Tomas Toft