Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Lindell, Yehuda
add a person with the name Lindell, Yehuda
 

Other publications of authors with the same name

Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs., and . TCC, volume 3378 of Lecture Notes in Computer Science, page 128-149. Springer, (2005)Lower Bounds for Concurrent Self Composition.. TCC, volume 2951 of Lecture Notes in Computer Science, page 203-222. Springer, (2004)Secure Two-Party Computation with Fairness - A Necessary Design Principle., and . TCC (1), volume 10677 of Lecture Notes in Computer Science, page 565-580. Springer, (2017)Concurrently-Secure Blind Signatures Without Random Oracles or Setup Assumptions., , , and . TCC, volume 4392 of Lecture Notes in Computer Science, page 323-341. Springer, (2007)Hiding the Input-Size in Secure Two-Party Computation., , and . ASIACRYPT (2), volume 8270 of Lecture Notes in Computer Science, page 421-440. Springer, (2013)Highly-Efficient Universally-Composable Commitments Based on the DDH Assumption.. EUROCRYPT, volume 6632 of Lecture Notes in Computer Science, page 446-466. Springer, (2011)On the Limitations of Universally Composable Two-Party Computation without Set-up Assumptions., , and . EUROCRYPT, volume 2656 of Lecture Notes in Computer Science, page 68-86. Springer, (2003)Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries., , and . SCN, volume 5229 of Lecture Notes in Computer Science, page 2-20. Springer, (2008)Cut-and-Choose Yao-Based Secure Computation in the Online/Offline and Batch Settings., and . CRYPTO (2), volume 8617 of Lecture Notes in Computer Science, page 476-494. Springer, (2014)Session-Key Generation Using Human Passwords Only., and . CRYPTO, volume 2139 of Lecture Notes in Computer Science, page 408-432. Springer, (2001)