default search action
BibTeX records: S. Dov Gordon
@inproceedings{DBLP:conf/scn/AcharyaBGMY24, author = {Ojaswi Acharya and Foteini Baldimtsi and Samuel Dov Gordon and Daniel McVicker and Aayush Yadav}, editor = {Clemente Galdi and Duong Hieu Phan}, title = {Universal Vector Commitments}, booktitle = {Security and Cryptography for Networks - 14th International Conference, {SCN} 2024, Amalfi, Italy, September 11-13, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14973}, pages = {161--181}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-71070-4\_8}, doi = {10.1007/978-3-031-71070-4\_8}, timestamp = {Fri, 20 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/AcharyaBGMY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AcharyaBGMY24, author = {Ojaswi Acharya and Foteini Baldimtsi and Samuel Dov Gordon and Daniel McVicker and Aayush Yadav}, title = {Universal Vector Commitments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {680}, year = {2024}, url = {https://eprint.iacr.org/2024/680}, timestamp = {Wed, 29 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AcharyaBGMY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GordonLM23, author = {S. Dov Gordon and Phi Hung Le and Daniel McVicker}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {Linear Communication in Malicious Majority {MPC}}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {2173--2187}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3623162}, doi = {10.1145/3576915.3623162}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GordonLM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/LiangKBGV22, author = {Mingyu Liang and Ioanna Karantaidou and Foteini Baldimtsi and S. Dov Gordon and Mayank Varia}, title = {({\(\in\)}, {\(\delta\)})-Indistinguishable Mixing for Cryptocurrencies}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2022}, number = {1}, pages = {49--74}, year = {2022}, url = {https://doi.org/10.2478/popets-2022-0004}, doi = {10.2478/POPETS-2022-0004}, timestamp = {Mon, 06 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/LiangKBGV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/GordonHL22, author = {S. Dov Gordon and Carmit Hazay and Phi Hung Le}, title = {Fully Secure {PSI} via MPC-in-the-Head}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2022}, number = {3}, pages = {291--313}, year = {2022}, url = {https://doi.org/10.56553/popets-2022-0073}, doi = {10.56553/POPETS-2022-0073}, timestamp = {Wed, 27 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/GordonHL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/BaldimtsiCGLM22, author = {Foteini Baldimtsi and Panagiotis Chatzigiannis and S. Dov Gordon and Phi Hung Le and Daniel McVicker}, title = {gOTzilla: Efficient Disjunctive Zero-Knowledge Proofs from {MPC} in the Head, with Application to Proofs of Assets in Cryptocurrencies}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2022}, number = {4}, pages = {229--249}, year = {2022}, url = {https://doi.org/10.56553/popets-2022-0107}, doi = {10.56553/POPETS-2022-0107}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/BaldimtsiCGLM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/GordonKLX22, author = {S. Dov Gordon and Jonathan Katz and Mingyu Liang and Jiayu Xu}, editor = {Giuseppe Ateniese and Daniele Venturi}, title = {Spreading the Privacy Blanket: - Differentially Oblivious Shuffling for Differential Privacy}, booktitle = {Applied Cryptography and Network Security - 20th International Conference, {ACNS} 2022, Rome, Italy, June 20-23, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13269}, pages = {501--520}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-09234-3\_25}, doi = {10.1007/978-3-031-09234-3\_25}, timestamp = {Tue, 21 Jun 2022 15:24:40 +0200}, biburl = {https://dblp.org/rec/conf/acns/GordonKLX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/ChoiDGLY22, author = {Seung Geol Choi and Dana Dachman{-}Soled and S. Dov Gordon and Linsheng Liu and Arkady Yerukhimovich}, editor = {Eike Kiltz and Vinod Vaikuntanathan}, title = {Secure Sampling with Sublinear Communication}, booktitle = {Theory of Cryptography - 20th International Conference, {TCC} 2022, Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13748}, pages = {348--377}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22365-5\_13}, doi = {10.1007/978-3-031-22365-5\_13}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/ChoiDGLY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaldimtsiCGLM22, author = {Foteini Baldimtsi and Panagiotis Chatzigiannis and S. Dov Gordon and Phi Hung Le and Daniel McVicker}, title = {gOTzilla: Efficient Disjunctive Zero-Knowledge Proofs from {MPC} in the Head, with Application to Proofs of Assets in Cryptocurrencies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {170}, year = {2022}, url = {https://eprint.iacr.org/2022/170}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BaldimtsiCGLM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GordonHL22, author = {S. Dov Gordon and Carmit Hazay and Phi Hung Le}, title = {Fully Secure {PSI} via MPC-in-the-Head}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {379}, year = {2022}, url = {https://eprint.iacr.org/2022/379}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GordonHL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-SoledCG22, author = {Dana Dachman{-}Soled and Seung Geol Choi and S. Dov Gordon and Linsheng Liu and Arkady Yerukhimovich}, title = {Secure Sampling with Sublinear Communication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {660}, year = {2022}, url = {https://eprint.iacr.org/2022/660}, timestamp = {Mon, 20 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-SoledCG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GordonHLL22, author = {S. Dov Gordon and Carmit Hazay and Phi Hung Le and Mingyu Liang}, title = {More Efficient (Reusable) Private Set Union}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {713}, year = {2022}, url = {https://eprint.iacr.org/2022/713}, timestamp = {Mon, 20 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GordonHLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GordonLM22, author = {S. Dov Gordon and Phi Hung Le and Daniel McVicker}, title = {Linear Communication in Malicious Majority {MPC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {781}, year = {2022}, url = {https://eprint.iacr.org/2022/781}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GordonLM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChoiDGLY21, author = {Seung Geol Choi and Dana Dachman{-}Soled and S. Dov Gordon and Linsheng Liu and Arkady Yerukhimovich}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {Compressed Oblivious Encoding for Homomorphically Encrypted Search}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {2277--2291}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3484792}, doi = {10.1145/3460120.3484792}, timestamp = {Tue, 16 Nov 2021 12:59:46 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChoiDGLY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GordonSY21, author = {S. Dov Gordon and Daniel Starin and Arkady Yerukhimovich}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {The More the Merrier: Reducing the Cost of Large Scale {MPC}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12697}, pages = {694--723}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77886-6\_24}, doi = {10.1007/978-3-030-77886-6\_24}, timestamp = {Mon, 28 Aug 2023 21:17:52 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GordonSY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-07708, author = {Seung Geol Choi and Dana Dachman{-}Soled and S. Dov Gordon and Linsheng Liu and Arkady Yerukhimovich}, title = {Compressed Oblivious Encoding for Homomorphically Encrypted Search}, journal = {CoRR}, volume = {abs/2109.07708}, year = {2021}, url = {https://arxiv.org/abs/2109.07708}, eprinttype = {arXiv}, eprint = {2109.07708}, timestamp = {Wed, 22 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-07708.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GordonSY21, author = {S. Dov Gordon and Daniel Starin and Arkady Yerukhimovich}, title = {The More The Merrier: Reducing the Cost of Large Scale {MPC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {303}, year = {2021}, url = {https://eprint.iacr.org/2021/303}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GordonSY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiangKBGV21, author = {Mingyu Liang and Ioanna Karantaidou and Foteini Baldimtsi and S. Dov Gordon and Mayank Varia}, title = {({\(\epsilon\)}, {\(\delta\)})-indistinguishable Mixing for Cryptocurrencies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1197}, year = {2021}, url = {https://eprint.iacr.org/2021/1197}, timestamp = {Fri, 03 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LiangKBGV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoiDGLY21, author = {Seung Geol Choi and Dana Dachman{-}Soled and S. Dov Gordon and Linsheng Liu and Arkady Yerukhimovich}, title = {Compressed Oblivious Encoding for Homomorphically Encrypted Search}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1199}, year = {2021}, url = {https://eprint.iacr.org/2021/1199}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoiDGLY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GordonKLX21, author = {S. Dov Gordon and Jonathan Katz and Mingyu Liang and Jiayu Xu}, title = {Spreading the Privacy Blanket: Differentially Oblivious Shuffling for Differential Privacy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1257}, year = {2021}, url = {https://eprint.iacr.org/2021/1257}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GordonKLX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MazloomLRG20, author = {Sahar Mazloom and Phi Hung Le and Samuel Ranellucci and S. Dov Gordon}, editor = {Srdjan Capkun and Franziska Roesner}, title = {Secure parallel computation on national scale volumes of data}, booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14, 2020}, pages = {2487--2504}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/mazloom}, timestamp = {Fri, 29 Jan 2021 22:08:55 +0100}, biburl = {https://dblp.org/rec/conf/uss/MazloomLRG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Dachman-SoledGL19, author = {Dana Dachman{-}Soled and S. Dov Gordon and Feng{-}Hao Liu and Adam O'Neill and Hong{-}Sheng Zhou}, title = {Leakage Resilience from Program Obfuscation}, journal = {J. Cryptol.}, volume = {32}, number = {3}, pages = {742--824}, year = {2019}, url = {https://doi.org/10.1007/s00145-018-9286-z}, doi = {10.1007/S00145-018-9286-Z}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Dachman-SoledGL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WailsJSYG19, author = {Ryan Wails and Aaron Johnson and Daniel Starin and Arkady Yerukhimovich and S. Dov Gordon}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {Stormy: Statistics in Tor by Measuring Securely}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {615--632}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3345650}, doi = {10.1145/3319535.3345650}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/WailsJSYG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LeRG19, author = {Phi Hung Le and Samuel Ranellucci and S. Dov Gordon}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {Two-party Private Set Intersection with an Untrusted Third Party}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {2403--2420}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3345661}, doi = {10.1145/3319535.3345661}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LeRG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeRG19, author = {Phi Hung Le and Samuel Ranellucci and S. Dov Gordon}, title = {Two-party Private Set Intersection with an Untrusted Third Party}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1338}, year = {2019}, url = {https://eprint.iacr.org/2019/1338}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeRG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/GenkinGR18, author = {Daniel Genkin and S. Dov Gordon and Samuel Ranellucci}, editor = {Bart Preneel and Frederik Vercauteren}, title = {Best of Both Worlds in Secure Computation, with Low Communication Overhead}, booktitle = {Applied Cryptography and Network Security - 16th International Conference, {ACNS} 2018, Leuven, Belgium, July 2-4, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10892}, pages = {340--359}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93387-0\_18}, doi = {10.1007/978-3-319-93387-0\_18}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/acns/GenkinGR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/GordonR018, author = {S. Dov Gordon and Samuel Ranellucci and Xiao Wang}, editor = {Thomas Peyrin and Steven D. Galbraith}, title = {Secure Computation with Low Communication from Cross-Checking}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11274}, pages = {59--85}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03332-3\_3}, doi = {10.1007/978-3-030-03332-3\_3}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/GordonR018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/GordonKW18, author = {S. Dov Gordon and Jonathan Katz and Xiao Wang}, editor = {Thomas Peyrin and Steven D. Galbraith}, title = {Simple and Efficient Two-Server {ORAM}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11274}, pages = {141--157}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03332-3\_6}, doi = {10.1007/978-3-030-03332-3\_6}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/GordonKW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MazloomG18, author = {Sahar Mazloom and S. Dov Gordon}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {Secure Computation with Differentially Private Access Patterns}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {490--507}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243851}, doi = {10.1145/3243734.3243851}, timestamp = {Tue, 10 Nov 2020 20:00:51 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MazloomG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0012GK18, author = {Xiao Wang and S. Dov Gordon and Jonathan Katz}, title = {Simple and Efficient Two-Server {ORAM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {5}, year = {2018}, url = {http://eprint.iacr.org/2018/005}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0012GK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GordonR018, author = {S. Dov Gordon and Samuel Ranellucci and Xiao Wang}, title = {Secure Computation with Low Communication from Cross-checking}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {216}, year = {2018}, url = {http://eprint.iacr.org/2018/216}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GordonR018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MazloomG17, author = {Sahar Mazloom and S. Dov Gordon}, title = {Differentially Private Access Patterns in Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1016}, year = {2017}, url = {http://eprint.iacr.org/2017/1016}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MazloomG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/WangGMK16, author = {Xiao Wang and S. Dov Gordon and Allen McIntosh and Jonathan Katz}, editor = {Ioannis G. Askoxylakis and Sotiris Ioannidis and Sokratis K. Katsikas and Catherine Meadows}, title = {Secure Computation of {MIPS} Machine Code}, booktitle = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9879}, pages = {99--117}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45741-3\_6}, doi = {10.1007/978-3-319-45741-3\_6}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/esorics/WangGMK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Dachman-SoledGL16, author = {Dana Dachman{-}Soled and S. Dov Gordon and Feng{-}Hao Liu and Adam O'Neill and Hong{-}Sheng Zhou}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {Leakage-Resilient Public-Key Encryption from Obfuscation}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9615}, pages = {101--128}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49387-8\_5}, doi = {10.1007/978-3-662-49387-8\_5}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Dachman-SoledGL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-SoledGL16, author = {Dana Dachman{-}Soled and S. Dov Gordon and Feng{-}Hao Liu and Adam O'Neill and Hong{-}Sheng Zhou}, title = {Leakage-Resilient Public-Key Encryption from Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {730}, year = {2016}, url = {http://eprint.iacr.org/2016/730}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-SoledGL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GordonLS15, author = {S. Dov Gordon and Feng{-}Hao Liu and Elaine Shi}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Constant-Round {MPC} with Fairness and Guarantee of Output Delivery}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {63--82}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_4}, doi = {10.1007/978-3-662-48000-7\_4}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GordonLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GordonKLSZ15, author = {S. Dov Gordon and Jonathan Katz and Feng{-}Hao Liu and Elaine Shi and Hong{-}Sheng Zhou}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {Multi-Client Verifiable Computation with Stronger Security Guarantees}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9015}, pages = {144--168}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46497-7\_6}, doi = {10.1007/978-3-662-46497-7\_6}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/GordonKLSZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GordonKLSZ15, author = {S. Dov Gordon and Jonathan Katz and Feng{-}Hao Liu and Elaine Shi and Hong{-}Sheng Zhou}, title = {Multi-Client Verifiable Computation with Stronger Security Guarantees}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {142}, year = {2015}, url = {http://eprint.iacr.org/2015/142}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GordonKLSZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GordonLS15, author = {S. Dov Gordon and Feng{-}Hao Liu and Elaine Shi}, title = {Constant-Round {MPC} with Fairness and Guarantee of Output Delivery}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {371}, year = {2015}, url = {http://eprint.iacr.org/2015/371}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GordonLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangGMK15, author = {Xiao Wang and S. Dov Gordon and Allen McIntosh and Jonathan Katz}, title = {Secure Computation of {MIPS} Machine Code}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {547}, year = {2015}, url = {http://eprint.iacr.org/2015/547}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangGMK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/GordonKKY14, author = {S. Dov Gordon and Jonathan Katz and Ranjit Kumaresan and Arkady Yerukhimovich}, title = {Authenticated broadcast with a partially compromised public-key infrastructure}, journal = {Inf. Comput.}, volume = {234}, pages = {17--25}, year = {2014}, url = {https://doi.org/10.1016/j.ic.2013.11.003}, doi = {10.1016/J.IC.2013.11.003}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/GordonKKY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GoldwasserGG0KLSSZ14, author = {Shafi Goldwasser and S. Dov Gordon and Vipul Goyal and Abhishek Jain and Jonathan Katz and Feng{-}Hao Liu and Amit Sahai and Elaine Shi and Hong{-}Sheng Zhou}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Multi-input Functional Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {578--602}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_32}, doi = {10.1007/978-3-642-55220-5\_32}, timestamp = {Thu, 14 Oct 2021 09:58:16 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GoldwasserGG0KLSSZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GordonMRW13, author = {S. Dov Gordon and Tal Malkin and Mike Rosulek and Hoeteck Wee}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Multi-party Computation of Polynomials and Branching Programs without Simultaneous Interaction}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {575--591}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_34}, doi = {10.1007/978-3-642-38348-9\_34}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GordonMRW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/AlwenBFGGTW13, author = {Jo{\"{e}}l Alwen and Manuel Barbosa and Pooya Farshim and Rosario Gennaro and S. Dov Gordon and Stefano Tessaro and David A. Wilson}, editor = {Martijn Stam}, title = {On the Relationship between Functional Encryption, Obfuscation, and Fully Homomorphic Encryption}, booktitle = {Cryptography and Coding - 14th {IMA} International Conference, {IMACC} 2013, Oxford, UK, December 17-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8308}, pages = {65--84}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-45239-0\_5}, doi = {10.1007/978-3-642-45239-0\_5}, timestamp = {Wed, 18 Mar 2020 16:00:57 +0100}, biburl = {https://dblp.org/rec/conf/ima/AlwenBFGGTW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GordonMRW13, author = {S. Dov Gordon and Tal Malkin and Mike Rosulek and Hoeteck Wee}, title = {Multi-Party Computation of Polynomials and Branching Programs without Simultaneous Interaction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {267}, year = {2013}, url = {http://eprint.iacr.org/2013/267}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GordonMRW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GordonKLSZ13, author = {S. Dov Gordon and Jonathan Katz and Feng{-}Hao Liu and Elaine Shi and Hong{-}Sheng Zhou}, title = {Multi-Input Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {774}, year = {2013}, url = {http://eprint.iacr.org/2013/774}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GordonKLSZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/GordonK12, author = {S. Dov Gordon and Jonathan Katz}, title = {Partial Fairness in Secure Two-Party Computation}, journal = {J. Cryptol.}, volume = {25}, number = {1}, pages = {14--40}, year = {2012}, url = {https://doi.org/10.1007/s00145-010-9079-5}, doi = {10.1007/S00145-010-9079-5}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/GordonK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GordonKKKM0V12, author = {S. Dov Gordon and Jonathan Katz and Vladimir Kolesnikov and Fernando Krell and Tal Malkin and Mariana Raykova and Yevgeniy Vahlis}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Secure two-party computation in sublinear (amortized) time}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {513--524}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382251}, doi = {10.1145/2382196.2382251}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/ccs/GordonKKKM0V12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/GordonHKL11, author = {S. Dov Gordon and Carmit Hazay and Jonathan Katz and Yehuda Lindell}, title = {Complete Fairness in Secure Two-Party Computation}, journal = {J. {ACM}}, volume = {58}, number = {6}, pages = {24:1--24:37}, year = {2011}, url = {https://doi.org/10.1145/2049697.2049698}, doi = {10.1145/2049697.2049698}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jacm/GordonHKL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GordonKV11, author = {S. Dov Gordon and Jonathan Katz and Vinod Vaikuntanathan}, title = {A Group Signature Scheme from Lattice Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {60}, year = {2011}, url = {http://eprint.iacr.org/2011/060}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GordonKV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GordonKKMRV11, author = {S. Dov Gordon and Jonathan Katz and Vladimir Kolesnikov and Tal Malkin and Mariana Raykova and Yevgeniy Vahlis}, title = {Secure Computation with Sublinear Amortized Work}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {482}, year = {2011}, url = {http://eprint.iacr.org/2011/482}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GordonKKMRV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/basesearch/Gordon10, author = {Samuel Dov Gordon}, title = {On Fairness in Secure Computation}, school = {University of Maryland, College Park, MD, {USA}}, year = {2010}, url = {https://hdl.handle.net/1903/11117}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/basesearch/Gordon10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/GordonKV10, author = {S. Dov Gordon and Jonathan Katz and Vinod Vaikuntanathan}, editor = {Masayuki Abe}, title = {A Group Signature Scheme from Lattice Assumptions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6477}, pages = {395--412}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17373-8\_23}, doi = {10.1007/978-3-642-17373-8\_23}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/GordonKV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GordonK10, author = {S. Dov Gordon and Jonathan Katz}, editor = {Henri Gilbert}, title = {Partial Fairness in Secure Two-Party Computation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6110}, pages = {157--176}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13190-5\_8}, doi = {10.1007/978-3-642-13190-5\_8}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GordonK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/GordonWXY10, author = {S. Dov Gordon and Hoeteck Wee and David Xiao and Arkady Yerukhimovich}, editor = {Michel Abdalla and Paulo S. L. M. Barreto}, title = {On the Round Complexity of Zero-Knowledge Proofs Based on One-Way Permutations}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2010, First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6212}, pages = {189--204}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14712-8\_12}, doi = {10.1007/978-3-642-14712-8\_12}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/latincrypt/GordonWXY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sss/GordonKKY10, author = {S. Dov Gordon and Jonathan Katz and Ranjit Kumaresan and Arkady Yerukhimovich}, editor = {Shlomi Dolev and Jorge Arturo Cobb and Michael J. Fischer and Moti Yung}, title = {Authenticated Broadcast with a Partially Compromised Public-Key Infrastructure}, booktitle = {Stabilization, Safety, and Security of Distributed Systems - 12th International Symposium, {SSS} 2010, New York, NY, USA, September 20-22, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6366}, pages = {144--158}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16023-3\_14}, doi = {10.1007/978-3-642-16023-3\_14}, timestamp = {Sat, 19 Oct 2019 20:07:49 +0200}, biburl = {https://dblp.org/rec/conf/sss/GordonKKY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GordonIMOS10, author = {S. Dov Gordon and Yuval Ishai and Tal Moran and Rafail Ostrovsky and Amit Sahai}, editor = {Daniele Micciancio}, title = {On Complete Primitives for Fairness}, booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC} 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5978}, pages = {91--108}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11799-2\_7}, doi = {10.1007/978-3-642-11799-2\_7}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/GordonIMOS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GordonK09, author = {S. Dov Gordon and Jonathan Katz}, editor = {Omer Reingold}, title = {Complete Fairness in Multi-party Computation without an Honest Majority}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {19--35}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_2}, doi = {10.1007/978-3-642-00457-5\_2}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/GordonK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GordonKKY09, author = {S. Dov Gordon and Jonathan Katz and Ranjit Kumaresan and Arkady Yerukhimovich}, title = {Authenticated Broadcast with a Partially Compromised Public-Key Infrastructure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {410}, year = {2009}, url = {http://eprint.iacr.org/2009/410}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GordonKKY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/GordonHKL08, author = {S. Dov Gordon and Carmit Hazay and Jonathan Katz and Yehuda Lindell}, editor = {Cynthia Dwork}, title = {Complete fairness in secure two-party computation}, booktitle = {Proceedings of the 40th Annual {ACM} Symposium on Theory of Computing, Victoria, British Columbia, Canada, May 17-20, 2008}, pages = {413--422}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1374376.1374436}, doi = {10.1145/1374376.1374436}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/GordonHKL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GordonK08, author = {S. Dov Gordon and Jonathan Katz}, title = {Partial Fairness in Secure Two-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {206}, year = {2008}, url = {http://eprint.iacr.org/2008/206}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GordonK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GordonHKL08, author = {S. Dov Gordon and Carmit Hazay and Jonathan Katz and Yehuda Lindell}, title = {Complete Fairness in Secure Two-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {303}, year = {2008}, url = {http://eprint.iacr.org/2008/303}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GordonHKL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GordonK08a, author = {S. Dov Gordon and Jonathan Katz}, title = {Complete Fairness in Multi-Party Computation Without an Honest Majority}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {458}, year = {2008}, url = {http://eprint.iacr.org/2008/458}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GordonK08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/GordonK06, author = {S. Dov Gordon and Jonathan Katz}, editor = {Roberto De Prisco and Moti Yung}, title = {Rational Secret Sharing, Revisited}, booktitle = {Security and Cryptography for Networks, 5th International Conference, {SCN} 2006, Maiori, Italy, September 6-8, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4116}, pages = {229--241}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11832072\_16}, doi = {10.1007/11832072\_16}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/scn/GordonK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GordonK06, author = {S. Dov Gordon and Jonathan Katz}, title = {Rational Secret Sharing, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {142}, year = {2006}, url = {http://eprint.iacr.org/2006/142}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GordonK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.