On the Security of the Free-XOR Technique
暂无分享,去创建一个
Jonathan Katz | Hong-Sheng Zhou | Ranjit Kumaresan | Seung Geol Choi | Jonathan Katz | R. Kumaresan | Hong-Sheng Zhou
[1] Abhi Shelat,et al. Two-Output Secure Computation with Malicious Adversaries , 2011, EUROCRYPT.
[2] Benny Pinkas,et al. Fairplay - Secure Two-Party Computation System (Awarded Best Student Paper!) , 2004 .
[3] David Cash,et al. Cryptographic Agility and Its Relation to Circular Encryption , 2010, EUROCRYPT.
[4] Jonathan Katz,et al. Private Set Intersection: Are Garbled Circuits Better than Custom Protocols? , 2012, NDSS.
[5] Claudio Orlandi,et al. LEGO for Two-Party Secure Computation , 2009, TCC.
[6] Benny Pinkas,et al. Secure Two-Party Computation is Practical , 2009, IACR Cryptol. ePrint Arch..
[7] Joe Kilian,et al. Founding crytpography on oblivious transfer , 1988, STOC '88.
[8] John Black,et al. Encryption-Scheme Security in the Presence of Key-Dependent Messages , 2002, Selected Areas in Cryptography.
[9] Yuval Ishai,et al. Founding Cryptography on Oblivious Transfer - Efficiently , 2008, CRYPTO.
[10] Dennis Hofheinz,et al. Towards Key-Dependent Message Security in the Standard Model , 2008, EUROCRYPT.
[11] Lior Malka,et al. VMCrypt: modular software architecture for scalable secure computation , 2011, CCS '11.
[12] Marina Blanton,et al. Secure and Efficient Protocols for Iris and Fingerprint Identification , 2011, ESORICS.
[13] Hugo Krawczyk,et al. Security under key-dependent inputs , 2007, CCS '07.
[14] Moni Naor,et al. Privacy preserving auctions and mechanism design , 1999, EC '99.
[15] Marc X. Makkes,et al. Efficient Implementation of the Orlandi Protocol , 2010, ACNS.
[16] Moses D. Liskov,et al. On Related-Secret Pseudorandomness , 2010, TCC.
[17] Claudio Orlandi,et al. A New Approach to Practical Active-Secure Two-Party Computation , 2012, IACR Cryptol. ePrint Arch..
[18] Ahmad-Reza Sadeghi,et al. Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima , 2009, IACR Cryptol. ePrint Arch..
[19] Ahmad-Reza Sadeghi,et al. TASTY: tool for automating secure two-party computations , 2010, CCS '10.
[20] A. Yao. How to generate and exchange secrets , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[21] David Cash,et al. Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems , 2009, CRYPTO.
[22] Rafail Ostrovsky,et al. Circular-Secure Encryption from Decision Diffie-Hellman , 2008, CRYPTO.
[23] Ran Canetti,et al. The random oracle methodology, revisited , 2000, JACM.
[24] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[25] Vladimir Kolesnikov,et al. Improved Garbled Circuit: Free XOR Gates and Applications , 2008, ICALP.
[26] Jonathan Katz,et al. Secure Multi-Party Computation of Boolean Circuits with Applications to Privacy in On-Line Marketplaces , 2012, CT-RSA.
[27] Yuval Ishai,et al. Semantic Security under Related-Key Attacks and Applications , 2011, ICS.
[28] Adam O'Neill,et al. Correlated-Input Secure Hash Functions , 2011, TCC.
[29] Yuval Ishai,et al. Extending Oblivious Transfers Efficiently , 2003, CRYPTO.
[30] David Cash,et al. Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks , 2010, CRYPTO.
[31] Jonathan Katz,et al. Faster Secure Two-Party Computation Using Garbled Circuits , 2011, USENIX Security Symposium.
[32] Yehuda Lindell,et al. A Proof of Security of Yao’s Protocol for Two-Party Computation , 2009, Journal of Cryptology.
[33] Benny Pinkas,et al. Fairplay - Secure Two-Party Computation System , 2004, USENIX Security Symposium.
[34] Yuval Ishai,et al. OT-Combiners via Secure Computation , 2008, TCC.
[35] Zvika Brakerski,et al. Circular and Leakage Resilient Public-Key Encryption Under Subgroup Indistinguishability (or: Quadratic Residuosity Strikes Back) , 2010, IACR Cryptol. ePrint Arch..
[36] Yehuda Lindell,et al. Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries , 2008, SCN.
[37] Mihir Bellare,et al. A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and Applications , 2003, EUROCRYPT.