Filter
Chapter

Search results

  • 2010

    Covert adversaries

    Hazay, C. & Lindell, Y., 2010, Information Security and Cryptography. Springer International Publishing, p. 109-143 35 p. (Information Security and Cryptography; vol. 15).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Definitions

    Hazay, C. & Lindell, Y., 2010, Information Security and Cryptography. Springer International Publishing, p. 19-49 31 p. (Information Security and Cryptography; vol. 15).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    1 Scopus citations
  • Malicious adversaries

    Hazay, C. & Lindell, Y., 2010, Information Security and Cryptography. Springer International Publishing, p. 81-108 28 p. (Information Security and Cryptography; vol. 15).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Oblivious transfer and applications

    Hazay, C. & Lindell, Y., 2010, Information Security and Cryptography. Springer International Publishing, p. 177-212 36 p. (Information Security and Cryptography; vol. 15).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Search problems

    Hazay, C. & Lindell, Y., 2010, Information Security and Cryptography. Springer International Publishing, p. 227-254 28 p. (Information Security and Cryptography; vol. 15).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • Semi-honest adversaries

    Hazay, C. & Lindell, Y., 2010, Information Security and Cryptography. Springer International Publishing, p. 53-80 28 p. (Information Security and Cryptography; vol. 15).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    2 Scopus citations
  • Sigma protocols and efficient zero-knowledge1

    Hazay, C. & Lindell, Y., 2010, Information Security and Cryptography. Springer International Publishing, p. 147-175 29 p. (Information Security and Cryptography; vol. 15).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    29 Scopus citations
  • The kth-ranked element

    Hazay, C. & Lindell, Y., 2010, Information Security and Cryptography. Springer International Publishing, p. 213-226 14 p. (Information Security and Cryptography; vol. 15).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

  • 2004

    Approximate parameterized matching

    Hazay, C., Lewenstein, M. & Soko, D., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Albers, S. & Radzik, T. (eds.). Springer Verlag, p. 414-425 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3221).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    20 Scopus citations
Your message has successfully been sent.
Your message was not sent due to an error.