International Association for Cryptologic Research

International Association
for Cryptologic Research

IACR Local Search

Possible queries include homomorphic author:david.
Found 20000 results
Maturity and Performance of Programmable Secure Computation
Eprint
https://eprint.iacr.org/2015/1039
David W. Archer Dan Bogdanov Benny Pinkas Pille Pullonen
Secure computation research has gained traction internationally in the last five years. In the United States, the DARPA PROCEED program (2011-2015) focused on development of multiple SC paradigms and improving their...
last revised 27 Oct 2016
From Input Private to Universally Composable Secure Multiparty Computation Primitives
Eprint
https://eprint.iacr.org/2014/201
Dan Bogdanov Peeter Laud Sven Laur Pille Pullonen
Secure multiparty computation systems are commonly built form a small set of primitive components. Composability of security notions has a central role in the analysis of such systems, since it allows us to deduce security...
last revised 29 May 2014
From Keys to Databases -- Real-World Applications of Secure Multi-Party Computation
Eprint
https://eprint.iacr.org/2018/450
David W. Archer Dan Bogdanov Liina Kamm Y. Lindell Kurt Nielsen Jakob Illeborg Pagter Nigel P. Smart Rebecca N. Wright
We discuss the widely increasing range of applications of a cryptographic technique called Multi-Party Computation. For many decades this was perceived to be of purely theoretical interest, but now it has started to find...
last revised 28 Nov 2018
Pille Pullonen
Author
https://iacr.org/cryptodb/data/author.php?authorkey=8994
CRYPTO 2013
https://iacr.org/conferences/crypto2013/papers-2013.html
CRYPTO 2013 Aug 18 – 22 Santa Barbara California USA Home > Technical Program Accepted Papers > Program > Rump Session > Call for Papers > General information Registration > Travel > US Visa > Accommodations > Stipends >...
Eurocrypt 2004
https://iacr.org/conferences/eurocrypt2004/accepted.html
Home Call for Papers Accepted Papers Program Proceedings Rump Session Venue Excursion Accommodation Travel Info Registration Sponsors Contact List of Accepted Papers On Generating the Initial Key in the Bounded Storage Model...
Eurocrypt 2004 - Accepted papers
https://iacr.org/newsletter/v21n1/ec-accepted.html
Eurocrypt 2004 - Accepted papers See the Eurocrypt 2004 web site for more information. On Generating the Initial Key in the Bounded Storage Model Stefan Dziembowski and Ueli Maurer Finding Small Roots of Bivariate Integer...
TCC 2011
https://iacr.org/workshops/tcc2011/accepted.html
Eighth IACR Theory of Cryptography Conference TCC 2011 March 28-30, 2011, Brown University Providence, Rhode Island, USA This page requires iframes. TCC 2011 Accepted Papers Secure Two-Party Computation via Cut-and-Choose...
TCC 2011
https://iacr.org/workshops/tcc2011/accepted-dec14.html
Eighth IACR Theory of Cryptography Conference TCC 2011 March 28-30, 2011, Brown University Providence, Rhode Island, USA This page requires iframes. TCC 2011 Accepted Papers Secure Two-Party Computation via Cut-and-Choose...
IACR CRYPTO 2013
https://iacr.org/archive/crypto2013/crypto2013-index.html
CRYPTO 2013: Juan A. Garay and Ran Canetti (Eds.): Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference Santa Barbara, CA, USA, August 18-22, 2013 Proceedings. CRYPTO 2013 Vol I CRYPTO 2013 Vol II Preface...
IACR TCC 2011
https://iacr.org/archive/tcc2011/tcc2011-index.html
TCC 2011: Yuval Ishai (Eds.): Theory of Cryptography - 8th Theory of Cryptography Conference - TCC 2011, TCC 2011, Providence, RI, USA, March 28-30, 2011 Proceedings. TCC 2011 Providence, RI, USA, March 28-30, 2011 Preface by...
David W. Archer
Author
https://iacr.org/cryptodb/data/author.php?authorkey=9685
5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs
Eprint
https://eprint.iacr.org/2016/619
Kevin Lewi Alex J. Malozemoff Daniel Apon Brent Carmer Adam Foltzer Daniel Wagner David W. Archer Dan Boneh Jonathan Katz Mariana Raykova
Secure multilinear maps (mmaps) have been shown to have remarkable applications in cryptography, such as program obfuscation and multi-input functional encryption (MIFE). To date, there has been little evaluation of the...
last revised 15 Nov 2016
Secure multi-party data analysis: end user validation and practical experiments
Eprint
https://eprint.iacr.org/2013/826
Dan Bogdanov Liina Kamm Sven Laur Pille Pruulmann-Vengerfeldt
Research papers on new secure multi-party computation protocols rarely confirm the need for the developed protocol with its end users. One challenge in the way of such validation is that it is hard to explain the benefits of...
received 5 Dec 2013
IACR EUROCRYPT 2004: Interlaken, Switzerland
https://iacr.org/archive/eurocrypt2004/index.html
Much of the information on this web page was provided courtesy of Michael Ley and the DBLP Project EUROCRYPT 2004: Interlaken, Switzerland Christian Cachin , Jan Camenisch (Eds.): Advances in Cryptology - EUROCRYPT 2004,...
IACR EUROCRYPT 2004: Interlaken, Switzerland
https://iacr.org/archive/eurocrypt2004/eurocrypt2004.html
Much of the information on this web page was provided courtesy of Michael Ley and the DBLP Project EUROCRYPT 2004: Interlaken, Switzerland Christian Cachin , Jan Camenisch (Eds.): Advances in Cryptology - EUROCRYPT 2004,...
Combining Secret Sharing and Garbled Circuits for Efficient Private IEEE 754 Floating-Point Computations
Eprint
https://eprint.iacr.org/2014/990
Pille Pullonen Sander Siim
Two of the major branches in secure multi-party computation research are secret sharing and garbled circuits. This work succeeds in combining these to enable seamlessly switching to the technique more efficient for the...
received 10 Dec 2014
CRYPTO 2013
https://iacr.org/conferences/crypto2013/program-2013.html
CRYPTO 2013 Aug 18 – 22 Santa Barbara California USA Home > Technical Program Accepted Papers > Program > Rump Session > Call for Papers > General information Registration > Travel > US Visa > Accommodations > Stipends >...
TCC 2011
https://iacr.org/workshops/tcc2011/program.html
Eighth IACR Theory of Cryptography Conference TCC 2011 March 28-30, 2011, Brown University Providence , Rhode Island , USA This page requires iframes. Preliminary Program (All the talks will be held at MacMillan Hall ) Sunday,...
Author Index, IACR Theory of Cryptography (TCC) 2011
https://iacr.org/archive/tcc2011/author-index.html
Author Index, IACR Theory of Cryptography (TCC) 2011 Bellare, Mihir, 232 Bogdanov, Andrej, 1 Boneh, Dan, 250 Brakerski, Zvika, 198 , 555 Bronson, Josh, 500 Döttling, Nico, 162 Dachman-Soled, Dana, 446 Damgård, Ivan, 142...
Next ►