# IACR Local Search

Possible queries include homomorphic author:david.
Found 30000 results
##### A Proof of Security of Yao's Protocol for Two-Party Computation
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=23460
Yehuda Lindell Benny Pinkas
Jofc 2009
##### A Proof of Yao's Protocol for Secure Two-Party Computation
Eprint
https://eprint.iacr.org/2004/175
Yehuda Lindell Benny Pinkas
In the mid 1980's, Yao presented a constant-round protocol for securely computing any two-party functionality in the presence of semi-honest adversaries (FOCS 1986). In this paper, we provide a complete description of Yao's...
last revised 11 Jan 2011
##### An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
Eprint
https://eprint.iacr.org/2008/049
Yehuda Lindell Benny Pinkas
We show an efficient secure two-party protocol, based on Yao's construction, which provides security against malicious adversaries. Yao's original protocol is only secure in the presence of semi-honest adversaries, and can be...
##### Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=29485
Yehuda Lindell Benny Pinkas
Jofc 2012
Protocols for secure two-party computation enable a pair of parties to compute a function of their inputs while preserving security properties such as privacy, correctness and independence of inputs. Recently, a number of...
##### Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer
Eprint
https://eprint.iacr.org/2010/284
Yehuda Lindell Benny Pinkas
Protocols for secure two-party computation enable a pair of parties to compute a function of their inputs while preserving security properties such as privacy, correctness and independence of inputs. Recently, a number of...
last revised 29 Oct 2014
##### An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=2854
Yehuda Lindell Benny Pinkas
Eurocrypt 2007
##### An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=26023
Yehuda Lindell Benny Pinkas
Jofc 2015
##### Eurocrypt 2003 Papers
https://iacr.org/conferences/eurocrypt2003/program.html
Eurocrypt 2003 Papers Cryptanalysis I Cryptanalysis of the EMD Mode of Operation Antoine Joux On the Optimality of Linear, Differential and Sequential Distinguishers Pascal Junod A Toolbox for Cryptanalysis: Linear and Affine...
##### TCC 2011
https://iacr.org/workshops/tcc2011/accepted.html
Eighth IACR Theory of Cryptography Conference TCC 2011 March 28-30, 2011, Brown University Providence, Rhode Island, USA This page requires iframes. TCC 2011 Accepted Papers Secure Two-Party Computation via Cut-and-Choose...
##### TCC 2011
https://iacr.org/workshops/tcc2011/accepted-dec14.html
Eighth IACR Theory of Cryptography Conference TCC 2011 March 28-30, 2011, Brown University Providence, Rhode Island, USA This page requires iframes. TCC 2011 Accepted Papers Secure Two-Party Computation via Cut-and-Choose...
##### EUROCRYPT 2003: Warsaw, Poland
https://iacr.org/archive/eurocrypt2003/eurocrypt2003.html
Much of the information on this web page was provided courtesy of Michael Ley and the DBLP Project EUROCRYPT 2003: Warsaw, Poland Eli Biham (Ed.): Advances in Cryptology - EUROCRYPT 2003, International Conference on the Theory...
##### Eurocrypt 2003 -- Program
https://iacr.org/conferences/eurocrypt2003/program2.html
PROGRAM May 4 - 8, 2003, Warsaw, Poland Program Committee Eli Biham (chair) , Technion, Israel Johannes Buchmann, TU Darmstadt, Germany Christian Cachin, IBM Research, Switzerland Don Coppersmith, IBM Research, USA Ronald...
##### Eurocrypt 2007
https://iacr.org/conferences/eurocrypt2007/accepted.html
Home Call for Papers FAQ Submission Accepted Papers Program Proceedings Rump Session Venue Excursion Accommodation Travel Info Registration Sponsors Contact Related Events List of Accepted Papers Chosen-prefix Collisions for...
##### IACR TCC 2011
https://iacr.org/archive/tcc2011/tcc2011-index.html
TCC 2011: Yuval Ishai (Eds.): Theory of Cryptography - 8th Theory of Cryptography Conference - TCC 2011, TCC 2011, Providence, RI, USA, March 28-30, 2011 Proceedings. TCC 2011 Providence, RI, USA, March 28-30, 2011 Preface by...
##### Eurocrypt 2004
https://iacr.org/conferences/eurocrypt2004/rump.html
Home Call for Papers Accepted Papers Program Proceedings Rump Session Venue Excursion Accommodation Travel Info Registration Sponsors Contact Rump Session The traditional rump session took place on Tuesday evening, chaired by...
##### Efficient Constant Round Multi-Party Computation Combining BMR and SPDZ
Eprint
https://eprint.iacr.org/2015/523
Yehuda Lindell Benny Pinkas Nigel P. Smart Avishay Yanai
Recently, there has been huge progress in the field of concretely efficient secure computation, even while providing security in the presence of \emph{malicious adversaries}. This is especially the case in the two-party...
last revised 18 Dec 2017
##### Efficient Constant-Round Multi-party Computation Combining BMR and SPDZ
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=29496
Yehuda Lindell Benny Pinkas Nigel P. Smart Avishay Yanai
Jofc 2019
Recently, there has been huge progress in the field of concretely efficient secure computation, even while providing security in the presence of malicious adversaries. This is especially the case in the two-party setting,...
##### Eurocrypt, 2007
https://iacr.org/archive/eurocrypt2007/eurocrypt2007.html
Much of the information on this web page was provided courtesy of Michael Ley and the DBLP Project Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic...
##### TCC 2011
https://iacr.org/workshops/tcc2011/program.html
Eighth IACR Theory of Cryptography Conference TCC 2011 March 28-30, 2011, Brown University Providence , Rhode Island , USA This page requires iframes. Preliminary Program (All the talks will be held at MacMillan Hall ) Sunday,...
##### On the Power of Secure Two-Party Computation
Eprint
https://eprint.iacr.org/2016/074
Carmit Hazay Muthuramakrishnan Venkitasubramaniam
Ishai, Kushilevitz, Ostrovsky and Sahai (STOC 2007, SIAM JoC 2009) introduced the powerful MPC-in-the-head'' technique that provided a general transformation of information-theoretic MPC protocols secure against passive...
last revised 27 Jan 2019