|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 94 occurrences of 68 keywords
|
|
|
Results
Found 262 publication records. Showing 262 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
81 | Yehuda Lindell |
Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 16(3), pp. 143-184, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Constant-round protocols, Coin-tossing, Secure computation |
57 | Boaz Barak, Yehuda Lindell |
Strict polynomial-time in simulation and extraction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings on 34th Annual ACM Symposium on Theory of Computing, May 19-21, 2002, Montréal, Québec, Canada, pp. 484-493, 2002, ACM, 1-58113-495-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
55 | Giuseppe Persiano, Ivan Visconti |
On Non-Interactive Zero-Knowledge Proofs of Knowledge in the Shared Random String Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MFCS ![In: Mathematical Foundations of Computer Science 2006, 31st International Symposium, MFCS 2006, Stará Lesná, Slovakia, August 28-September 1, 2006, Proceedings, pp. 753-764, 2006, Springer, 3-540-37791-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
54 | Yehuda Lindell |
Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings, pp. 171-189, 2001, Springer, 3-540-42456-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
46 | Boaz Barak |
Constant-Round Coin-Tossing with a Man in the Middle or Realizing the Shared Random String Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 43rd Symposium on Foundations of Computer Science (FOCS 2002), 16-19 November 2002, Vancouver, BC, Canada, Proceedings, pp. 345-355, 2002, IEEE Computer Society, 0-7695-1822-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
44 | Ronald Cramer, Ivan Damgård |
Secure Distributed Linear Algebra in a Constant Number of Rounds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings, pp. 119-136, 2001, Springer, 3-540-42456-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
43 | Rafael Pass |
Bounded-concurrent secure multi-party computation with a dishonest majority. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 36th Annual ACM Symposium on Theory of Computing, Chicago, IL, USA, June 13-16, 2004, pp. 232-241, 2004, ACM, 1-58113-852-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
constant-round protocols, simulation-sound zero-knowledge, secure multi-party computation, concurrent composition |
43 | Yan Zong Ding, Danny Harnik, Alon Rosen, Ronen Shaltiel |
Constant-Round Oblivious Transfer in the Bounded Storage Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 20(2), pp. 165-202, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
43 | Carlo Blundo, Clemente Galdi, Pino Persiano |
Randomness Recycling in Constant-Round Private Computations (extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
DISC ![In: Distributed Computing, 13th International Symposium, Bratislava, Slovak Republic, September 27-29, 1999, Proceedings, pp. 138-150, 1999, Springer, 3-540-66531-5. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
40 | Rafail Ostrovsky, Giuseppe Persiano, Ivan Visconti |
Constant-Round Concurrent Non-malleable Zero Knowledge in the Bare Public-Key Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALP (2) ![In: Automata, Languages and Programming, 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II - Track B: Logic, Semantics, and Theory of Programming & Track C: Security and Cryptography Foundations, pp. 548-559, 2008, Springer, 978-3-540-70582-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
non-malleable zero knowledge, witness indistinguishability |
40 | Carlo Blundo, Clemente Galdi, Giuseppe Persiano |
Low-randomness constant-round private XOR computations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 6(1), pp. 15-26, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Randomness, Multiparty computation |
40 | Giovanni Di Crescenzo, Giuseppe Persiano, Ivan Visconti |
Constant-Round Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings, pp. 237-253, 2004, Springer, 3-540-22668-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
38 | Jonathan Katz, Chiu-Yuen Koo |
On Expected Constant-Round Protocols for Byzantine Agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings, pp. 445-462, 2006, Springer, 3-540-37432-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
38 | Yuval Ishai, Eyal Kushilevitz |
Perfect Constant-Round Secure Computation via Perfect Randomizing Polynomials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALP ![In: Automata, Languages and Programming, 29th International Colloquium, ICALP 2002, Malaga, Spain, July 8-13, 2002, Proceedings, pp. 244-256, 2002, Springer, 3-540-43864-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
36 | Rafael Pass, Hoeteck Wee |
Black-Box Constructions of Two-Party Protocols from One-Way Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings, pp. 403-418, 2009, Springer, 978-3-642-00456-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
black-box constructions, zero-knowledge arguments, trapdoor commitments, parallel coin-tossing, non-malleable commitments, secure two-party computation |
35 | Jun Furukawa 0001, Kaoru Kurosawa, Hideki Imai |
An Efficient Compiler from Sigma-Protocol to 2-Move Deniable Zero-Knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALP (2) ![In: Automata, Languages and Programming, 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part II, pp. 46-57, 2006, Springer, 3-540-35907-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
constant-round, resettable zero-knowledge, the random oracle model, resettably-sound argument of knowledge, ?-protocol, efficient, deniable |
35 | Junghyun Nam, Juryon Paik, Ung-Mo Kim, Dongho Won |
Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings, pp. 158-176, 2007, Springer, 978-3-540-72737-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
nonce-chained authentication, scalability, Cryptography, provable security, binary tree, group key exchange |
35 | Jin Wook Byun, Su-Mi Lee, Dong Hoon Lee 0001, Dowon Hong |
Constant-Round Password-Based Group Key Generation for Multi-layer Ad-Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings, pp. 3-17, 2006, Springer, 3-540-33376-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
multi-layer ad-hoc network, pervasive computing, heterogeneous, key agreement, Password authentication, authenticated key exchange |
35 | Ivan Damgård, Yuval Ishai |
Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings, pp. 378-394, 2005, Springer, 3-540-28114-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Yehuda Lindell, Anna Lysyanskaya, Tal Rabin |
Sequential composition of protocols without simultaneous termination. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODC ![In: Proceedings of the Twenty-First Annual ACM Symposium on Principles of Distributed Computing, PODC 2002, Monterey, California, USA, July 21-24, 2002, pp. 203-212, 2002, ACM, 1-58113-485-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
32 | Giovanni Di Crescenzo, Kouichi Sakurai, Moti Yung |
Result-Indistinguishable Zero-Knowledge Proofs: Increased Power and Constant-Round Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STACS ![In: STACS 98, 15th Annual Symposium on Theoretical Aspects of Computer Science, Paris, France, February 25-27, 1998, Proceedings, pp. 511-521, 1998, Springer, 3-540-64230-7. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
30 | Stanislaw Jarecki, Jihye Kim, Gene Tsudik |
Robust group key agreement using short broadcasts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 411-420, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
fault tolerance, group key agreement |
30 | Giovanni Di Crescenzo, Ivan Visconti |
Concurrent Zero Knowledge in the Public-Key Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALP ![In: Automata, Languages and Programming, 32nd International Colloquium, ICALP 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings, pp. 816-827, 2005, Springer, 3-540-27580-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Shuhua Wu, Yuefei Zhu |
Constant-Round Password-Based Authenticated Key Exchange Protocol for Dynamic Groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers, pp. 69-82, 2008, Springer, 978-3-540-85229-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
provably secure, key exchange, password authenticated, dynamic group |
28 | Juan A. Garay, Jonathan Katz, Chiu-Yuen Koo, Rafail Ostrovsky |
Round Complexity of Authenticated Broadcast with a Dishonest Majority. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2007), October 20-23, 2007, Providence, RI, USA, Proceedings, pp. 658-668, 2007, IEEE Computer Society, 978-0-7695-3010-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Iftach Haitner, Omer Reingold, Salil P. Vadhan, Hoeteck Wee |
Inaccessible entropy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 41st Annual ACM Symposium on Theory of Computing, STOC 2009, Bethesda, MD, USA, May 31 - June 2, 2009, pp. 611-620, 2009, ACM, 978-1-60558-506-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
interactive hashing, computational complexity, cryptography, zero knowledge, one-way functions, commitment schemes |
27 | Alejandro Hevia |
Universally Composable Simultaneous Broadcast. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks, 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings, pp. 18-33, 2006, Springer, 3-540-38080-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Boaz Barak, Yehuda Lindell, Salil P. Vadhan |
Lower Bounds for Non-Black-Box Zero Knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 44th Symposium on Foundations of Computer Science (FOCS 2003), 11-14 October 2003, Cambridge, MA, USA, Proceedings, pp. 384-393, 2003, IEEE Computer Society, 0-7695-2040-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
27 | Satoshi Hada |
Zero-Knowledge and Code Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings, pp. 443-457, 2000, Springer, 3-540-41404-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
27 | Iftach Haitner, Mohammad Mahmoody, David Xiao |
A New Sampling Protocol and Applications to Basing Cryptographic Primitives on the Hardness of NP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCC ![In: Proceedings of the 25th Annual IEEE Conference on Computational Complexity, CCC 2010, Cambridge, Massachusetts, USA, June 9-12, 2010, pp. 76-87, 2010, IEEE Computer Society, 978-0-7695-4060-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
sampling protocols, constant-round statistically hiding commitments, black-box lower bounds, collision-resistant hash functions |
27 | Oded Goldreich 0001, Erez Petrank |
Quantifying Knowledge Complexity ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 32nd Annual Symposium on Foundations of Computer Science, San Juan, Puerto Rico, 1-4 October 1991, pp. 59-68, 1991, IEEE Computer Society, 0-8186-2445-0. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
constant round AM proofs, knowledge complexity, inclusion results, separation results, Hint sense, computational complexity, languages, proof system |
27 | Rafael Pass, Muthuramakrishnan Venkitasubramaniam |
On Constant-Round Concurrent Zero-Knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008., pp. 553-570, 2008, Springer, 978-3-540-78523-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Ratna Dutta, Rana Barua |
Constant Round Dynamic Group Key Agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings, pp. 74-88, 2005, Springer, 3-540-29001-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
DDH problem, provable security, group key agreement |
27 | Alon Rosen |
A Note on Constant-Round Zero-Knowledge Proofs for NP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, First Theory of Cryptography Conference, TCC 2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings, pp. 191-202, 2004, Springer, 3-540-21000-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Yan Zong Ding, Danny Harnik, Alon Rosen, Ronen Shaltiel |
Constant-Round Oblivious Transfer in the Bounded Storage Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, First Theory of Cryptography Conference, TCC 2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings, pp. 446-472, 2004, Springer, 3-540-21000-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Hyun-Jeong Kim, Su-Mi Lee, Dong Hoon Lee 0001 |
Constant-Round Authenticated Group Key Exchange for Dynamic Groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings, pp. 245-259, 2004, Springer, 3-540-23975-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
dynamic authenticated group key exchange, ad hoc networks |
27 | Emmanuel Bresson, Dario Catalano |
Constant Round Authenticated Group Key Agreement via Distributed Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004, pp. 115-129, 2004, Springer, 3-540-21018-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
27 | John Watrous |
PSPACE Has Constant-Round Quantum Interactive Proof Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 40th Annual Symposium on Foundations of Computer Science, FOCS '99, 17-18 October, 1999, New York, NY, USA, pp. 112-119, 1999, IEEE Computer Society, 0-7695-0409-4. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
quantum computation, interactive proof systems |
25 | Vipul Goyal, Abhishek Jain 0002 |
On the round complexity of covert computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 42nd ACM Symposium on Theory of Computing, STOC 2010, Cambridge, Massachusetts, USA, 5-8 June 2010, pp. 191-200, 2010, ACM, 978-1-4503-0050-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
covert computation, cryptography, round complexity |
25 | Rafael Pass, Muthuramakrishnan Venkitasubramaniam |
An efficient parallel repetition theorem for Arthur-Merlin games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 39th Annual ACM Symposium on Theory of Computing, San Diego, California, USA, June 11-13, 2007, pp. 420-429, 2007, ACM, 978-1-59593-631-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
computationally-sound arguments, public-coin protocols, proofs of knowledge, Arthur-Merlin games, parallel repetition |
24 | Yi Deng 0002, Giovanni Di Crescenzo, Dongdai Lin, Dengguo Feng |
Concurrently Non-malleable Black-Box Zero Knowledge in the Bare Public-Key Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSR ![In: Computer Science - Theory and Applications, Fourth International Computer Science Symposium in Russia, CSR 2009, Novosibirsk, Russia, August 18-23, 2009. Proceedings, pp. 80-91, 2009, Springer, 978-3-642-03350-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Huijia Lin, Rafael Pass |
Non-malleability amplification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 41st Annual ACM Symposium on Theory of Computing, STOC 2009, Bethesda, MD, USA, May 31 - June 2, 2009, pp. 189-198, 2009, ACM, 978-1-60558-506-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
cryptography, commitment, non-malleability, round complexity |
22 | Peng Zhang, Chengqing Ye, Xin Li, Xuying Ma |
An Efficient Keys Agreement for Multi-party's Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDCAT ![In: Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2005), 5-8 December 2005, Dalian, China, pp. 267-269, 2005, IEEE Computer Society, 0-7695-2405-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Ronald Cramer, Serge Fehr, Yuval Ishai, Eyal Kushilevitz |
Efficient Multi-party Computation over Rings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings, pp. 596-613, 2003, Springer, 3-540-14039-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Rosario Gennaro |
A Protocol to Achieve Independence in Constant Rounds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 11(7), pp. 636-647, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
simultaneous broadcast and Verifiable Secret Sharing (VSS) protocols, computation model, communication networks, Independence |
22 | Tatsuaki Okamoto, David Chaum, Kazuo Ohta |
Direct Zero Knowledge Proofs of Computational Power in Five Rounds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings, pp. 96-105, 1991, Springer, 3-540-54620-0. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
19 | Saurav Pandit, Sriram V. Pemmaraju, Kasturi R. Varadarajan |
Approximation Algorithms for Domatic Partitions of Unit Disk Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APPROX-RANDOM ![In: Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, 12th International Workshop, APPROX 2009, and 13th International Workshop, RANDOM 2009, Berkeley, CA, USA, August 21-23, 2009. Proceedings, pp. 312-325, 2009, Springer, 978-3-642-03684-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Reza Curtmola, Juan A. Garay, Seny Kamara, Rafail Ostrovsky |
Searchable symmetric encryption: improved definitions and efficient constructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, October 30 - November 3, 2006, pp. 79-88, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
searchable symmetric encryption, security definitions, multi-user, searchable encryption |
19 | Rafael Pass, Alon Rosen |
New and improved constructions of non-malleable cryptographic protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 37th Annual ACM Symposium on Theory of Computing, Baltimore, MD, USA, May 22-24, 2005, pp. 533-542, 2005, ACM, 1-58113-960-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
non black-box simulation, cryptography, zero-knowledge, non-malleability, round-complexity, man-in-the-middle |
19 | Shai Halevi, Silvio Micali |
Practical and Provably-Secure Commitment Schemes from Collision-Free Hashing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings, pp. 201-215, 1996, Springer, 3-540-61512-1. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
19 | Jonathan Katz |
On achieving the "best of both worlds" in secure multiparty computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 39th Annual ACM Symposium on Theory of Computing, San Diego, California, USA, June 11-13, 2007, pp. 11-20, 2007, ACM, 978-1-59593-631-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
secure computation |
19 | Alan L. Selman, Samik Sengupta |
Polylogarithmic-Round Interactive Proofs for coNP Collapse the Exponential Hierarchy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCC ![In: 19th Annual IEEE Conference on Computational Complexity (CCC 2004), 21-24 June 2004, Amherst, MA, USA, pp. 82-90, 2004, IEEE Computer Society, 0-7695-2120-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Nan Cheng, Naman Gupta, Aikaterini Mitrokotsa, Hiraku Morita, Kazunari Tozawa |
Constant-Round Private Decision Tree Evaluation for Secret Shared Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. Priv. Enhancing Technol. ![In: Proc. Priv. Enhancing Technol. 2024(1), pp. 397-412, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Ching-Fang Hsu 0001, Zhe Xia, Tianshu Cheng, Lein Harn |
Extremely Lightweight Constant-Round Membership-Authenticated Group Key Establishment for Resource-Constrained Smart Environments toward 5G. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. J. ![In: Comput. J. 67(3), pp. 840-850, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Damiano Abram, Jack Doerner, Yuval Ishai, Varun Narayanan |
Constant-Round Simulation-Secure Coin Tossing Extension with Guaranteed Output. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT (5) ![In: Advances in Cryptology - EUROCRYPT 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part V, pp. 122-154, 2024, Springer, 978-3-031-58739-9. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Yongjun Wang, Kun Xiong, Yongli Tang, Li Yang, Jing Zhang, Xixi Yan |
More efficient constant-round secure multi-party computation based on optimized Tiny-OT and half-gate. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 79, pp. 103650, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Tapaswini Mohanty, Vikas Srivastava, Sihem Mesnager, Sumit Kumar Debnath |
A constant round quantum secure protocol for oblivious polynomial evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 77, pp. 103560, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Takeshi Nakai, Kazumasa Shinagawa |
Constant-round linear-broadcast secure computation with penalties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Theor. Comput. Sci. ![In: Theor. Comput. Sci. 959, pp. 113874, May 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Noga Amit, Guy N. Rothblum |
Constant-Round Arguments from One-Way Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Electron. Colloquium Comput. Complex. ![In: Electron. Colloquium Comput. Complex. TR23, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
18 | Luke Harmon, Gaetan Delavignette |
Mercury: Constant-Round Protocols for Multi-Party Computation with Rationals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 855, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
18 | Nan Cheng, Naman Gupta, Aikaterini Mitrokotsa, Hiraku Morita, Kazunari Tozawa |
Constant-Round Private Decision Tree Evaluation for Secret Shared Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 1307, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
18 | Noga Amit, Guy N. Rothblum |
Constant-Round Arguments from One-Way Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 802, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
18 | Matthieu Rambaud |
Adaptively Secure Consensus with Linear Complexity and Constant Round under Honest Majority in the Bare PKI Model, and Separation Bounds from the Idealized Message-Authentication Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 1757, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
18 | Yongfeng Xu, Hanyu Jia, Xiangxue Li, Qiang Li, Yue Bao, Xintian Hou |
Constant-Round Multiparty Private Function Evaluation with (Quasi-)Linear Complexities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security - 21st International Conference, ACNS 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part II, pp. 115-142, 2023, Springer, 978-3-031-33490-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Luke Harmon, Gaetan Delavignette |
Mercury: Constant-Round Protocols for Multi-Party Computation with Rationals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 26th International Conference, ISC 2023, Groningen, The Netherlands, November 15-17, 2023, Proceedings, pp. 309-326, 2023, Springer, 978-3-031-49186-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Noga Amit, Guy N. Rothblum |
Constant-Round Arguments from One-Way Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 55th Annual ACM Symposium on Theory of Computing, STOC 2023, Orlando, FL, USA, June 20-23, 2023, pp. 1537-1544, 2023, ACM, 978-1-4503-9913-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Susumu Kiyoshima |
Constant-Round Leakage-Resilient Zero-Knowledge from Collision Resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 35(3), pp. 16, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Hikaru Tsuchida, Takashi Nishide |
Constant-Round Fair SS-4PC for Private Decision Tree Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 105-A(9), pp. 1270-1288, September 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Keitaro Hiwatashi, Satsuya Ohata, Koji Nuida |
An Efficient Secure Division Protocol Using Approximate Multi-Bit Product and New Constant-Round Building Blocks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 105-A(3), pp. 404-416, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Jie Ma, Bin Qi, Kewei Lv |
Constant-round auction with insulated bidders. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Inf. Sci. ![In: Sci. China Inf. Sci. 65(4), 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Takeshi Nakai, Kazumasa Shinagawa |
Constant-Round Linear-Broadcast Secure Computation with Penalties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2206.06010, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Myungsun Kim |
A New Approach to the Constant-Round Re-encryption Mix-Net. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 877, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
18 | Ran Canetti, Oxana Poburinnaya, Muthuramakrishnan Venkitasubramaniam |
Equivocating Yao: Constant-Round Adaptively Secure Multiparty Computation in the Plain Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIAM J. Comput. ![In: SIAM J. Comput. 51(2), pp. 17-333, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | MohammadTaghi Hajiaghayi, Marina Knittel, Hamed Saleh, Hsin-Hao Su |
Adaptive Massively Parallel Constant-Round Tree Contraction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCS ![In: 13th Innovations in Theoretical Computer Science Conference, ITCS 2022, January 31 - February 3, 2022, Berkeley, CA, USA., pp. 83:1-83:23, 2022, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 978-3-95977-217-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Kai-Min Chung, Yi Lee, Han-Hsuan Lin, Xiaodi Wu 0001 |
Constant-Round Blind Classical Verification of Quantum Sampling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT (3) ![In: Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part III, pp. 707-736, 2022, Springer, 978-3-031-07081-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Shiri Chechik, Tianyi Zhang 0008 |
Constant-Round Near-Optimal Spanners in Congested Clique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODC ![In: PODC '22: ACM Symposium on Principles of Distributed Computing, Salerno, Italy, July 25 - 29, 2022, pp. 325-334, 2022, ACM, 978-1-4503-9262-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Nai-Hui Chia, Kai-Min Chung, Xiao Liang 0014, Takashi Yamakawa |
Post-quantum Simulatable Extraction with Minimal Assumptions: Black-Box and Constant-Round. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO (3) ![In: Advances in Cryptology - CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part III, pp. 533-563, 2022, Springer, 978-3-031-15981-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Shuichi Hirahara, Rahul Ilango, Bruno Loff |
Hardness of Constant-round Communication Complexity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Electron. Colloquium Comput. Complex. ![In: Electron. Colloquium Comput. Complex. TR21, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
18 | Nai-Hui Chia, Kai-Min Chung, Xiao Liang 0014, Takashi Yamakawa |
Post-Quantum Simulatable Extraction with Minimal Assumptions: Black-Box and Constant-Round. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2111.08665, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
18 | MohammadTaghi Hajiaghayi, Marina Knittel, Hamed Saleh, Hsin-Hao Su |
Adaptive Massively Parallel Constant-round Tree Contraction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2111.01904, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
18 | Nai-Hui Chia, Kai-Min Chung, Xiao Liang 0014, Takashi Yamakawa |
Post-Quantum Simulatable Extraction with Minimal Assumptions: Black-Box and Constant-Round. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2021, pp. 1516, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
18 | Artur Czumaj, Peter Davies, Merav Parter |
Simple, Deterministic, Constant-Round Coloring in Congested Clique and MPC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIAM J. Comput. ![In: SIAM J. Comput. 50(5), pp. 1603-1626, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
18 | Omer Reingold, Guy N. Rothblum, Ron D. Rothblum |
Constant-Round Interactive Proofs for Delegating Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIAM J. Comput. ![In: SIAM J. Comput. 50(3), 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
18 | Nai-Hui Chia, Kai-Min Chung, Qipeng Liu 0001, Takashi Yamakawa |
On the Impossibility of Post-Quantum Black-Box Zero-Knowledge in Constant Round. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 62nd IEEE Annual Symposium on Foundations of Computer Science, FOCS 2021, Denver, CO, USA, February 7-10, 2022, pp. 59-67, 2021, IEEE, 978-1-6654-2055-6. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
18 | Michal Dory, Orr Fischer, Seri Khoury, Dean Leitersdorf |
Constant-Round Spanners and Shortest Paths in Congested Clique and MPC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODC ![In: PODC '21: ACM Symposium on Principles of Distributed Computing, Virtual Event, Italy, July 26-30, 2021, pp. 223-233, 2021, ACM, 978-1-4503-8548-0. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
18 | Simeon Kublenz, Sebastian Siebertz, Alexandre Vigny |
Constant Round Distributed Domination on Graph Classes with Bounded Expansion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIROCCO ![In: Structural Information and Communication Complexity - 28th International Colloquium, SIROCCO 2021, Wrocław, Poland, June 28 - July 1, 2021, Proceedings, pp. 334-351, 2021, Springer, 978-3-030-79526-9. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
18 | Shuichi Hirahara, Rahul Ilango, Bruno Loff |
Hardness of Constant-Round Communication Complexity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCC ![In: 36th Computational Complexity Conference, CCC 2021, July 20-23, 2021, Toronto, Ontario, Canada (Virtual Conference)., pp. 31:1-31:30, 2021, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 978-3-95977-193-1. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
18 | Rakyong Choi, Dongyeon Hong, Seongho Han, Seunggeun Baek, Wooseok Kang, Kwangjo Kim |
Design and Implementation of Constant-Round Dynamic Group Key Exchange from RLWE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 8, pp. 94610-94630, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
18 | Carmit Hazay, Peter Scholl, Eduardo Soria-Vazquez |
Low Cost Constant Round MPC Combining BMR and Oblivious Transfer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 33(4), pp. 1732-1786, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
18 | Hiraku Morita, Nuttapong Attrapadung, Tadanori Teruya, Satsuya Ohata, Koji Nuida, Goichiro Hanaoka |
Constant-Round Client-Aided Two-Server Secure Comparison Protocol and Its Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(1), pp. 21-32, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
18 | Artur Czumaj, Peter Davies, Merav Parter |
Simple, Deterministic, Constant-Round Coloring in the Congested Clique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2009.06043, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
18 | Nai-Hui Chia, Kai-Min Chung, Takashi Yamakawa |
A Black-Box Approach to Post-Quantum Zero-Knowledge in Constant Round. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2011.02670, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
18 | Kai-Min Chung, Yi Lee, Han-Hsuan Lin, Xiaodi Wu 0001 |
Constant-round Blind Classical Verification of Quantum Sampling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2012.04848, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
18 | Vijay K. Garg, Saptaparni Kumar, Lewis Tseng, Xiong Zheng |
Amortized Constant Round Atomic Snapshot in Message-Passing Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2008.11837, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
18 | Jun Wan 0008, Hanshen Xiao, Elaine Shi, Srinivas Devadas |
Expected Constant Round Byzantine Broadcast under Dishonest Majority. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2020, pp. 590, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
18 | Rakyong Choi, Dongyeon Hong, Kwangjo Kim |
Constant-round Dynamic Group Key Exchange from RLWE Assumption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2020, pp. 35, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
18 | Carsten Baum, Emmanuela Orsini, Peter Scholl, Eduardo Soria-Vazquez |
Efficient Constant-Round MPC with Identifiable Abort and Public Verifiability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2020, pp. 767, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
18 | Oded Goldreich 0001, Guy N. Rothblum |
Constant-Round Interactive Proof Systems for AC0[2] and NC1. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computational Complexity and Property Testing ![In: Computational Complexity and Property Testing - On the Interplay Between Randomness and Computation, pp. 326-351, 2020, Springer, 978-3-030-43661-2. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
18 | Klim Efremenko, Elad Haramaty, Yael Tauman Kalai |
Interactive Coding with Constant Round and Communication Blowup. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCS ![In: 11th Innovations in Theoretical Computer Science Conference, ITCS 2020, January 12-14, 2020, Seattle, Washington, USA., pp. 7:1-7:34, 2020, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 978-3-95977-134-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
18 | Jun Wan 0008, Hanshen Xiao, Elaine Shi, Srinivas Devadas |
Expected Constant Round Byzantine Broadcast Under Dishonest Majority. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC (1) ![In: Theory of Cryptography - 18th International Conference, TCC 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part I, pp. 381-411, 2020, Springer, 978-3-030-64374-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 262 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ >>] |
|