Filter
Conference contribution

Search results

  • 2024

    Ligetron: Lightweight Scalable End-to-End Zero-Knowledge Proofs Post-Quantum ZK-SNARKs on a Browser

    Wang, R., Hazay, C. & Venkitasubramaniam, M., 2024, Proceedings - 45th IEEE Symposium on Security and Privacy, SP 2024. Institute of Electrical and Electronics Engineers Inc., p. 1760-1776 17 p. (Proceedings - IEEE Symposium on Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • LR-OT: Leakage-Resilient Oblivious Transfer

    Berti, F., Hazay, C. & Levi, I., 2024, Security and Cryptography for Networks - 14th International Conference, SCN 2024, Proceedings. Galdi, C. & Phan, D. H. (eds.). Springer Science and Business Media Deutschland GmbH, p. 182-204 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14973 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Malicious Security for SCALES: Outsourced Computation with Ephemeral Servers

    Acharaya, A., Hazay, C., Kolesnikov, V. & Prabhakaran, M., 2024, Advances in Cryptology – CRYPTO 2024 - 44th Annual International Cryptology Conference, Proceedings. Reyzin, L. & Stebila, D. (eds.). Springer Science and Business Media Deutschland GmbH, p. 3-38 36 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14928 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Toward Malicious Constant-Rate 2PC via Arithmetic Garbling

    Hazay, C. & Yang, Y., 2024, Advances in Cryptology – EUROCRYPT 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2024, Proceedings. Joye, M. & Leander, G. (eds.). Springer Science and Business Media Deutschland GmbH, p. 401-431 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14655 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2023

    A New Approach to Garbled Circuits

    Acharya, A., Ashur, T., Cohen, E., Hazay, C. & Yanai, A., 2023, Applied Cryptography and Network Security - 21st International Conference, ACNS 2023, Proceedings. Tibouchi, M. & Wang, X. (eds.). Springer Science and Business Media Deutschland GmbH, p. 611-641 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13906 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Batchman and Robin: Batched and Non-batched Branching for Interactive ZK

    Yang, Y., Heath, D., Hazay, C., Kolesnikov, V. & Venkitasubramaniam, M., 15 Nov 2023, CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 1452-1466 15 p. (CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    1 Scopus citations
  • Best of Both Worlds: Revisiting the Spymasters Double Agent Problem

    Acharya, A., Hazay, C., Poburinnaya, O. & Venkitasubramaniam, M., 2023, Advances in Cryptology – CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Proceedings. Handschuh, H. & Lysyanskaya, A. (eds.). Springer Science and Business Media Deutschland GmbH, p. 328-359 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14081 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Beyond MPC-in-the-Head: Black-Box Constructions of Short Zero-Knowledge Proofs

    Hazay, C., Venkitasubramaniam, M. & Weiss, M., 2023, Theory of Cryptography - 21st International Conference, TCC 2023, Proceedings. Rothblum, G. & Wee, H. (eds.). Springer Science and Business Media Deutschland GmbH, p. 3-33 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14369 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Flag: A Framework for Lightweight Robust Secure Aggregation

    Bangalore, L., Sereshgi, M. H. F., Hazay, C. & Venkitasubramaniam, M., 10 Jul 2023, ASIA CCS 2023 - Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, p. 14-28 15 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Private Polynomial Commitments and Applications to MPC

    Bhadauria, R., Hazay, C., Venkitasubramaniam, M., Wu, W. & Zhang, Y., 2023, Public-Key Cryptography – PKC 2023 - 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Boldyreva, A. & Kolesnikov, V. (eds.). Springer Science and Business Media Deutschland GmbH, p. 127-158 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13941 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    2 Scopus citations
  • Putting the Online Phase on a Diet: Covert Security from Short MACs

    Faust, S., Hazay, C., Kretzler, D. & Schlosser, B., 2023, Topics in Cryptology – CT-RSA 2023 - Cryptographers’ Track at the RSA Conference 2023, Proceedings. Rosulek, M. (ed.). Springer Science and Business Media Deutschland GmbH, p. 360-386 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13871 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Statement-Oblivious Threshold Witness Encryption

    Faust, S., Hazay, C., Kretzler, D. & Schlosser, B., 2023, Proceedings - 2023 IEEE 36th Computer Security Foundations Symposium, CSF 2023. IEEE Computer Society, p. 17-32 16 p. (Proceedings - IEEE Computer Security Foundations Symposium; vol. 2023-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Your Reputation’s Safe with Me: Framing-Free Distributed Zero-Knowledge Proofs

    Hazay, C., Venkitasubramaniam, M. & Weiss, M., 2023, Theory of Cryptography - 21st International Conference, TCC 2023, Proceedings. Rothblum, G. & Wee, H. (eds.). Springer Science and Business Media Deutschland GmbH, p. 34-64 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14369 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2022

    Asymptotically Quasi-Optimal Cryptography

    de Castro, L., Hazay, C., Ishai, Y., Vaikuntanathan, V. & Venkitasubramaniam, M., 2022, Advances in Cryptology – EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2022, Proceedings. Dunkelman, O. & Dziembowski, S. (eds.). Springer Science and Business Media Deutschland GmbH, p. 303-334 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13275 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Comparison-based MPC in Star Topology

    Chandran, G. R., Hazay, C., Hundt, R. & Schneider, T., 2022, SECRYPT 2022 - Proceedings of the 19th International Conference on Security and Cryptography. De Capitani di Vimercati, S. & Samarati, P. (eds.). Science and Technology Publications, Lda, p. 69-82 14 p. (Proceedings of the International Conference on Security and Cryptography; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    3 Scopus citations
  • Financially Backed Covert Security

    Faust, S., Hazay, C., Kretzler, D. & Schlosser, B., 2022, Public-Key Cryptography - PKC 2022 - 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Hanaoka, G., Shikata, J. & Watanabe, Y. (eds.). Springer Science and Business Media Deutschland GmbH, p. 99-129 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13178 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • On Black-Box Constructions of Time and Space Efficient Sublinear Arguments from Symmetric-Key Primitives

    Bangalore, L., Bhadauria, R., Hazay, C. & Venkitasubramaniam, M., 2022, Theory of Cryptography - 20th International Conference, TCC 2022, Proceedings. Kiltz, E. & Vaikuntanathan, V. (eds.). Springer Science and Business Media Deutschland GmbH, p. 417-446 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13747 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Protecting Distributed Primitives Against Leakage: Equivocal Secret Sharing and More

    Hazay, C., Venkitasubramaniam, M. & Weiss, M., 1 Jul 2022, 3rd Conference on Information-Theoretic Cryptography, ITC 2022. Dachman-Soled, D. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 3. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 230).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • SCALES: MPC with Small Clients and Larger Ephemeral Servers

    Acharya, A., Hazay, C., Kolesnikov, V. & Prabhakaran, M., 2022, Theory of Cryptography - 20th International Conference, TCC 2022, Proceedings. Kiltz, E. & Vaikuntanathan, V. (eds.). Springer Science and Business Media Deutschland GmbH, p. 502-531 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13748 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • 2021

    Diogenes: Lightweight scalable RSA modulus generation with a dishonest majority

    Chen, M., Hazay, C., Ishai, Y., Kashnikov, Y., Micciancio, D., Riviere, T., Shelat, A., Venkitasubramaniam, M. & Wang, R., May 2021, Proceedings - 2021 IEEE Symposium on Security and Privacy, SP 2021. Institute of Electrical and Electronics Engineers Inc., p. 590-607 18 p. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2021-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    16 Scopus citations
  • Generic Compiler for Publicly Verifiable Covert Multi-Party Computation

    Faust, S., Hazay, C., Kretzler, D. & Schlosser, B., 2021, Advances in Cryptology – EUROCRYPT 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Canteaut, A. & Standaert, F.-X. (eds.). Springer Science and Business Media Deutschland GmbH, p. 782-811 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12697 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • ZK-PCPs from leakage-resilient secret sharing

    Hazay, C., Venkitasubramaniam, M. & Weiss, M., 1 Jul 2021, 2nd Conference on Information-Theoretic Cryptography, ITC 2021. Tessaro, S. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 6. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 199).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • 2020

    Going Beyond Dual Execution: MPC for Functions with Efficient Verification

    Hazay, C., Shelat, A. & Venkitasubramaniam, M., 2020, Public-Key Cryptography – PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Kiayias, A., Kohlweiss, M., Wallden, P. & Zikas, V. (eds.). Springer, p. 328-356 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12111 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Gradual gram and secure computation for ram programs

    Hazay, C. & Lilintal, M., 2020, Security and Cryptography for Networks - 12th International Conference, SCN 2020, Proceedings. Galdi, C. & Kolesnikov, V. (eds.). Springer Science and Business Media Deutschland GmbH, p. 233-252 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12238 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Is the Classical GMW Paradigm Practical? The Case of Non-Interactive Actively Secure 2PC

    Abascal, J., Faghihi Sereshgi, M. H., Hazay, C., Ishai, Y. & Venkitasubramaniam, M., 30 Oct 2020, CCS 2020 - Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1591-1605 15 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • Ligero++: A New Optimized Sublinear IOP

    Bhadauria, R., Fang, Z., Hazay, C., Venkitasubramaniam, M., Xie, T. & Zhang, Y., 30 Oct 2020, CCS 2020 - Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2025-2038 14 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    47 Scopus citations
  • Multi-clients verifiable computation via conditional disclosure of secrets

    Bhadauria, R. & Hazay, C., 2020, Security and Cryptography for Networks - 12th International Conference, SCN 2020, Proceedings. Galdi, C. & Kolesnikov, V. (eds.). Springer Science and Business Media Deutschland GmbH, p. 150-171 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12238 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • The Price of Active Security in Cryptographic Protocols

    Hazay, C., Venkitasubramaniam, M. & Weiss, M., 2020, Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Canteaut, A. & Ishai, Y. (eds.). Springer, p. 184-215 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12106 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • Which languages have 4-round fully black-box zero-knowledge arguments from one-way functions?

    Hazay, C., Pass, R. & Venkitasubramaniam, M., 2020, Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Canteaut, A. & Ishai, Y. (eds.). Springer, p. 599-619 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12107 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2019

    Fast actively secure five-party computation with security beyond abort

    Byali, M., Patra, A., Hazay, C. & Singla, S., 6 Nov 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1573-1590 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    10 Scopus citations
  • Fast Actively Secure Five-Party Computation with Security Beyond Abort

    Hazay, C., Byali, M., Patra, P. & Singla, S., 2019, Proceedings of the ACM Conference on Computer and Communications Security.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Leviosa: Lightweight secure arithmetic computation

    Hazay, C., Marcedone, A., Ishai, Y. & Venkitasubramaniam, M., 6 Nov 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 327-344 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    31 Scopus citations
  • 2018

    Concretely efficient large-scale MPC with active security (or, tinykeys for TinyOT)

    Hazay, C., Orsini, E., Scholl, P. & Soria-Vazquez, E., 2018, Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Peyrin, T. & Galbraith, S. (eds.). Springer Verlag, p. 86-117 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11274 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    14 Scopus citations
  • Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT)

    Hazay, C., Orsini, E., Scholl, P. & Soria-Vazquez, E., 2018, ASIACRYPT.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Round-optimal fully black-box zero-knowledge arguments from one-way permutations

    Hazay, C. & Venkitasubramaniam, M., 2018, Theory of Cryptography - 16th International Conference, TCC 2018, Proceedings. Beimel, A. & Dziembowski, S. (eds.). Springer Verlag, p. 263-285 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11239 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • Round-Optimal Fully Black-Box Zero-Knowledge Arguments from One-Way Permutations,

    Hazay, C. & Venkitasubramaniam, M., 2018, TCC.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Round-optimal secure multi-party computation

    Halevi, S., Hazay, C., Polychroniadou, A. & Venkitasubramaniam, M., 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Boldyreva, A. & Shacham, H. (eds.). Springer Verlag, p. 488-520 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10992 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    22 Scopus citations
  • TinyKeys: A new approach to efficient multi-party computation

    Hazay, C., Orsini, E., Scholl, P. & Soria-Vazquez, E., 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Shacham, H. & Boldyreva, A. (eds.). Springer Verlag, p. 3-33 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10993 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    20 Scopus citations
  • 2017

    Actively secure garbled circuits with constant communication overhead in the plain model

    Hazay, C., Ishai, Y. & Venkitasubramaniam, M., 2017, Theory of Cryptography - 15th International Conference, TCC 2017, Proceedings. Kalai, Y. & Reyzin, L. (eds.). Springer Verlag, p. 3-39 37 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10678 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    16 Scopus citations
  • Constant round adaptively secure protocols in the tamper-proof hardware model

    Hazay, C., Polychroniadou, A. & Venkitasubramaniam, M., 2017, Public-Key Cryptography – PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings. Fehr, S. (ed.). Springer Verlag, p. 428-460 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10175 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Scopus citations
  • Ligero: Lightweight sublinear arguments without a trusted setup

    Ames, S., Hazay, C., Ishai, Y. & Venkitasubramaniam, M., 30 Oct 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2087-2104 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    233 Scopus citations
  • Ligero: Lightweight Sublinear Arguments Without a Trusted Setup

    Hazay, C., Ames, S., Ishai, Y. & Venkitasubramaniam, M., 2017, CCS.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Low cost constant round MPC combining BMR and oblivious transfer

    Hazay, C., Scholl, P. & Soria-Vazquez, E., 2017, Advances in Cryptology – ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Proceedings. Takagi, T. & Peyrin, T. (eds.). Springer Verlag, p. 598-628 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10624 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    51 Scopus citations
  • Scalable multi-party private set-intersection

    Hazay, C. & Venkitasubramaniam, M., 2017, Public-Key Cryptography – PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings. Fehr, S. (ed.). Springer Verlag, p. 175-203 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10174 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    76 Scopus citations
  • 2016

    Composable adaptive secure protocols without setup under polytime assumptions

    Hazay, C. & Venkitasubramaniam, M., 2016, Theory of Cryptography - 14th International Conference, TCC 2016-B, Proceedings. Smith, A. & Hirt, M. (eds.). Springer Verlag, p. 400-432 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9985 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    8 Scopus citations
  • Composable security in the tamper-proof hardware model under minimal complexity

    Hazay, C., Polychroniadou, A. & Venkitasubramaniam, M., 2016, Theory of Cryptography - 14th International Conference, TCC 2016-B, Proceedings. Smith, A. & Hirt, M. (eds.). Springer Verlag, p. 367-399 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9985 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    18 Scopus citations
  • Constant-round maliciously secure two-party computation in the RAM model

    Hazay, C. & Yanai, A., 2016, Theory of Cryptography - 14th International Conference, TCC 2016-B, Proceedings. Smith, A. & Hirt, M. (eds.). Springer Verlag, p. 521-553 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9985 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    8 Scopus citations
  • On the power of secure two-party computation

    Hazay, C. & Venkitasubramaniam, M., 2016, Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings. Robshaw, M. & Katz, J. (eds.). Springer Verlag, p. 397-429 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9815).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    20 Scopus citations
  • The feasibility of outsourced database search in the plain model

    Hazay, C. & Zarosim, H., 2016, Security and Cryptography for Networks - 10th International Conference, SCN 2016, Proceedings. De Prisco, R. & Zikas, V. (eds.). Springer Verlag, p. 313-332 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9841 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • What security can we achieve within 4 rounds?

    Hazay, C. & Venkitasubramaniam, M., 2016, Security and Cryptography for Networks - 10th International Conference, SCN 2016, Proceedings. De Prisco, R. & Zikas, V. (eds.). Springer Verlag, p. 486-505 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9841 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
Your message has successfully been sent.
Your message was not sent due to an error.