Note: the order of the papers here is according to the year of the conference in which the paper was presented.

An Efficient Transform from Sigma Protocols to NIZK with a CRS and Non-Programmable Random Oracle

More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries

Adaptively Secure Computation with Partial Erasures

A Simpler Variant of Universally Composable Security for Standard Multiparty Computation

Efficient Constant Round Multi-Party Computation Combining BMR and SPDZ.

Fast Garbling of Circuits Under Standard Assumptions

GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte

Blazing Fast 2PC in the Offline/Online Setting with Security for Malicious Adversaries

Skip to content