International Association for Cryptologic Research

International Association
for Cryptologic Research

IACR Local Search

Possible queries include homomorphic author:david.
Found 20000 results
Efficient Two-Party Secure Computation on Committed Inputs
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=2907
Stanislaw Jarecki Vitaly Shmatikov
Eurocrypt 2007
Eurocrypt 2007
https://iacr.org/conferences/eurocrypt2007/accepted.html
Home Call for Papers FAQ Submission Accepted Papers Program Proceedings Rump Session Venue Excursion Accommodation Travel Info Registration Sponsors Contact Related Events List of Accepted Papers Chosen-prefix Collisions for...
Eurocrypt, 2007
https://iacr.org/archive/eurocrypt2007/eurocrypt2007.html
Much of the information on this web page was provided courtesy of Michael Ley and the DBLP Project Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic...
Eurocrypt 2007
https://iacr.org/conferences/eurocrypt2007/program.html
Home Call for Papers FAQ Submission Accepted Papers Program Proceedings Rump Session Venue Excursion Accommodation Travel Info Registration Sponsors Contact Related Events Program Eurocrypt 2007, May 20-24, 2007, Barcelona,...
Efficient Covert Two-Party Computation
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=28881
Stanislaw Jarecki
Pkc 2018
Covert computation strengthens secure computation by hiding not only participants’ inputs (up to what the protocol outputs reveal), but also the fact of computation taking place (up to the same constraint). Existing...
Efficient Covert Two-Party Computation
Eprint
https://eprint.iacr.org/2016/1032
Stanislaw Jarecki
Covert computation of general functions strengthens the notion of secure computation, so that the computation hides not only everything about the participants' inputs except for what is revealed by the function output, but it...
last revised 9 Apr 2017
Handcuffing Big Brother: an Abuse-Resilient Transaction Escrow Scheme
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=2403
Stanislaw Jarecki Vitaly Shmatikov
Eurocrypt 2004
Eurocrypt 2004
https://iacr.org/conferences/eurocrypt2004/accepted.html
Home Call for Papers Accepted Papers Program Proceedings Rump Session Venue Excursion Accommodation Travel Info Registration Sponsors Contact List of Accepted Papers On Generating the Initial Key in the Bounded Storage Model...
Eurocrypt 2003 -- Program
https://iacr.org/conferences/eurocrypt2003/program2.html
PROGRAM May 4 - 8, 2003, Warsaw, Poland Program Committee Eli Biham (chair) , Technion, Israel Johannes Buchmann, TU Darmstadt, Germany Christian Cachin, IBM Research, Switzerland Don Coppersmith, IBM Research, USA Ronald...
Eurocrypt 2004 - Accepted papers
https://iacr.org/newsletter/v21n1/ec-accepted.html
Eurocrypt 2004 - Accepted papers See the Eurocrypt 2004 web site for more information. On Generating the Initial Key in the Bounded Storage Model Stefan Dziembowski and Ueli Maurer Finding Small Roots of Bivariate Integer...
TCC 2009 Accepted Submissions
https://iacr.org/workshops/tcc2009.dir/tcc09/accepted-papers.htm
TCC 2009 Accepted Papers On the (Im)Possibility of Key Dependent Encryption Iftach Haitner; Thomas Holenstein Hierarchical Identity Based Encryption with Polynomially Many Levels Craig Gentry; Shai Halevi Universally...
Asiacrypt 05 -
https://iacr.org/conferences/asiacrypt2005/www.cs.iitm.ernet.in/~ac05/session.html
List of Accepted Papers - Sessionwise Algebra and Number Theory Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log Pascal Paillier, Damien Vergnaud Do All Elliptic Curves of the Same Order Have the Same...
Vitaly Shmatikov
Author
https://iacr.org/cryptodb/data/author.php?authorkey=72
The University of Texas at Austin
Eurocrypt 2003 Papers
https://iacr.org/conferences/eurocrypt2003/program.html
Eurocrypt 2003 Papers Cryptanalysis I Cryptanalysis of the EMD Mode of Operation Antoine Joux On the Optimality of Linear, Differential and Sequential Distinguishers Pascal Junod A Toolbox for Cryptanalysis: Linear and Affine...
IACR CRYPTO 2013
https://iacr.org/archive/crypto2013/crypto2013-index.html
CRYPTO 2013: Juan A. Garay and Ran Canetti (Eds.): Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference Santa Barbara, CA, USA, August 18-22, 2013 Proceedings. CRYPTO 2013 Vol I CRYPTO 2013 Vol II Preface...
List of Accepted Papers - Asiacrypt 05
https://iacr.org/conferences/asiacrypt2005/www.cs.iitm.ernet.in/~ac05/accept.html
List of Accepted Papers Submission 16: A Failure-Friendly Design Principle for Hash Functions Stefan Lucks Submission 20: Gate Evaluation Secret Sharing And Secure One-Round Two-Party Computation Vladimir Kolesnikov Submission...
IACR EUROCRYPT 2004 Author Index
https://iacr.org/archive/eurocrypt2004/author-index.html
IACR EUROCRYPT 2004 Author Index Aggarwal, Gagan 39 Bellare, Mihir 172 , 269 , 396 Boldyreva, Alexandra 172 Boneh, Dan 57 , 224 , 501 Boyen, Xavier 57 , 224 Canetti, Ran 208 Canny, John 139 Carlet, Claude 469 Chen, Liqun 287...
Committe @ Public Key Cryptography 2009
https://iacr.org/workshops/pkc2009/committee.html
Conference Chairs Stanislaw Jarecki and Gene Tsudik, UC Irvine Program Committee Xavier Boyen, (Voltage Security, USA) Christian Cachin, (IBM Zurich, Switzerland) Jan Camenisch, (IBM Zurich, Switzerland) Jung Hee Cheon, (Seoul...
IACR PKC 2009
https://iacr.org/archive/pkc2009/pkc2009.html
PKC 2009: Gene Tsudik (Ed.): Public Key Cryptography - PKC 2009 - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009 Proceedings. PKC 2009 Irvine, CA,...
ASIACRYPT 2005
https://iacr.org/archive/asiacrypt2005/asiacrypt2005.html
Much of the information on this web page was provided courtesy of Michael Ley and the DBLP Project ASIACRYPT 2005: Chennai, India Bimal K. Roy, (Ed.): Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on...
Next ►