Note: the order of the papers here is according to the year of the conference in which the paper was presented.

Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries

Aggregate Message Authentication Codes

Legally Enforceable Fairness in Secure Two-Party Computation

Efficient Fully-Simulatable Oblivious Transfer

Complete Fairness in Secure Two-Party Computation

Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries

Constructions of Truly Practical Secure Protocols using Standard Smartcards

Skip to content