Note: the order of the papers here is according to the year of the conference in which the paper was presented.

Secure Multiparty Computation for Privacy-Preserving Data Mining

Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer

Adaptively Secure Two-Party Computation with Erasures

Comparison-Based Key Exchange and the Security of the Numeric Comparison Mode in Bluetooth v2.1

Collusion-Free Multiparty Computation in the Mediated Model

Utility Dependence in Correct and Fair Rational Secret Sharing

Skip to content