Secure Multiparty Computation for Privacy-Preserving Data Mining 2009 Y. Lindell and B. Pinkas In the Journal of Privacy and Confidentiality, 1(1):59-98, 2009. PDF
Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer 2009 Y. Lindell and H. Zarosim In the Journal of Cryptology, 24(4):761-799, 2011. An extended abstract appeared in the 6th TCC, Springer (LNCS 5444), pages 183-201, 2009. PDF
Adaptively Secure Two-Party Computation with Erasures 2009 Y. Lindell In CT-RSA, Springer (LNCS 5473), pages 117-132, 2009. Full version available. PDF
Comparison-Based Key Exchange and the Security of the Numeric Comparison Mode in Bluetooth v2.1 2009 Y. Lindell In CT-RSA, Springer (LNCS 5473), pages 66-83, 2009. Full version available. PDF
Collusion-Free Multiparty Computation in the Mediated Model 2009 J. Alwen, J. Katz, Y. Lindell, G. Persiano, A. Shelat and I. Visconti In CRYPTO 2009, Springer-Verlag (LNCS 5677), pages 524-540, 2009. PDF
Utility Dependence in Correct and Fair Rational Secret Sharing 2009 G. Asharov and Y. Lindell. In the Journal of Cryptology, 24(1):157-202, 2011. An extended abstract appeared in CRYPTO 2009, Springer-Verlag (LNCS 5677), pages 559-576, 2009. PDF