How To Simulate It – A Tutorial on the Simulation Proof Technique 2016 Y. Lindell. Cryptology ePrint Archive: Report 2016/046, 2016. PDF
Attribute-based Key Exchange with General Policies 2016 V. Kolesnikov, H. Krawczyk, Y. Lindell, A.J. Malozemoff and T. Rabin In the 23rd ACM CCS, pages 1451-1463, 2016. PDF
Optimizing Semi-Honest Secure Multiparty Computation for the Internet 2016 A. Ben-Efraim, Y. Lindell and E. Omri. In the 23rd ACM CCS, pages 578-590, 2016. PDF
High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority 2016 T. Araki, J. Furukawa, Y. Lindell, A. Nof and K. Ohara In the 23rd ACM CCS, pages 805-817, 2016. Recipient of the best-paper award. PDF
More Efficient Constant-Round Multi-Party Computation from BMR and SHE. 2016 Y. Lindell, N.P. Smart and E. Soria-Vazquez. In TCC 2016-B, Springer (LNCS 9985), pages 554-581, 2016. PDF