Top results
universally composable oblivious transfer protocol based on the rlwe assumption pedro branco∗1,2, jintai ding3, manuel goulão1,2, and paulo mateus1,2 1sqig-it 2department…
a framework for practical universally composable zero-knowledge protocols jan camenisch1 stephan krenn2 and victor shoup3 1 ibm research – zurich rüschlikon switzerland…
universally-composable security of key distribution from causality constraints universally-composable security of key distribution from causality constraints based on results…
a framework for practical universally composable zero-knowledge protocolsjan camenisch1, stephan krenn2, and victor shoup3 1 ibm research – zurich, ruschlikon, switzerland
universally composable security: a new paradigm for cryptographic protocols∗ ran canetti† december 30, 2018 abstract we present a general framework for describing cryptographic…
proposal #: 55-p080-08 presenter: paul syverson code 5543 (202) 404-7931 [email protected] funding summary: $870000, fy08-fy10 anonymity analysis of onion routing…
universally composable accumulators foteini badimtsi10000−0003−3296−5336 ran canetti20000−0002−5479−7540 and sophia yakoubov20000−0001−7958−8537 1 george…
incoercible multi-party computation and universally composable receipt-free voting joël alwen1 rafail ostrovsky2 hong-sheng zhou3 and vassilis zikas4 1 ist austria jalwen@istacat…
hal id: hal-00878632https://hal.inria.fr/hal-00878632submitted on 7 oct 2015hal is a multi-disciplinary open accessarchive for the deposit and dissemination of sci-entific…
simulatable channels: extended security that is universally composable and easier to prove asiacrypt 2018 m fischlinj p degabriele 1 what this talk is about… • we propose…
slide 1 anonymity analysis of onion routing in the universally composable framework joan feigenbaum aaron johnson paul syverson yale university u.s. naval research laboratory…
slide 1 1 analyzing anonymity protocols 1.analyzing onion-routing security 1.anonymity analysis of onion routing in the universally composable framework in provable privacy…
ruse regional administration and internationale elias canetti gesellschaft 110 years from the birth of elias canetti 2015 canetti year ruse regional administration and internationale…
8/12/2019 canetti elias adorno theodor elias canetti discussion with theodor w adorno 1/168/12/2019 canetti elias adorno theodor elias canetti discussion with theodor w adorno…
david goliath oblivious affine function evaluation – asymptotically optimal building blocks for universally composable two-party computation from a single untrusted stateful…
universally composable cryptographic role-based access control bin liu and bogdan warinschi university of bristol, uk [email protected] [email protected] abstract.…
universally composable relaxed password authenticated key exchange michel abdalla1,2, manuel barbosa3, tatiana bradley4, stanis law jarecki4, jonathan katz5, jiayu xu5,6…
basing cryptographic protocols on tamper-evident sealsi tal moran∗,a,1,2, moni naora,3 adepartment of computer science and applied mathematics, weizmann institute of science,…
session id: cryp-f03 practical, anonymous, and publicly linkable universally-composable reputation systems jakob juhnke phd student/research assistantpaderborn universitypaderborn,…
universally composable symbolic analysis of mutual authentication and key-exchange protocols� extended abstract ran canetti1,�� and jonathan herzog2,� � � 1 ibm…