Note: the order of the papers here is according to the year of the conference in which the paper was presented.

Concurrently-Secure Blind Signatures without Random Oracles or Setup Assumptions

Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries

An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries

Skip to content