If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2023

    Best of Both Worlds: Revisiting the Spymasters Double Agent Problem

    Acharya, A., Hazay, C., Poburinnaya, O. & Venkitasubramaniam, M., 2023, Advances in Cryptology – CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Proceedings. Handschuh, H. & Lysyanskaya, A. (eds.). Springer Science and Business Media Deutschland GmbH, p. 328-359 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14081 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Comparison-based MPC in Star Topology

    Chandran, G. R., Hazay, C., Hundt, R. & Schneider, T., 19 Jan 2023, Proceedings of the 19th International Conference on Security and Cryptography - SECRYPT. SciTePress, p. 69-82 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Flag: A Framework for Lightweight Robust Secure Aggregation

    Bangalore, L., Sereshgi, M. H. F., Hazay, C. & Venkitasubramaniam, M., 10 Jul 2023, ASIA CCS 2023 - Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, p. 14-28 15 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Private Polynomial Commitments and Applications to MPC

    Bhadauria, R., Hazay, C., Venkitasubramaniam, M., Wu, W. & Zhang, Y., 2023, Public-Key Cryptography – PKC 2023 - 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Boldyreva, A. & Kolesnikov, V. (eds.). Springer Science and Business Media Deutschland GmbH, p. 127-158 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13941 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Putting the Online Phase on a Diet: Covert Security from Short MACs

    Faust, S., Hazay, C., Kretzler, D. & Schlosser, B., 2023, Topics in Cryptology – CT-RSA 2023 - Cryptographers’ Track at the RSA Conference 2023, Proceedings. Rosulek, M. (ed.). Springer Science and Business Media Deutschland GmbH, p. 360-386 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13871 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Statement-Oblivious Threshold Witness Encryption

    Faust, S., Hazay, C., Kretzler, D. & Schlosser, B., 2023, Proceedings - 2023 IEEE 36th Computer Security Foundations Symposium, CSF 2023. IEEE Computer Society, p. 17-32 16 p. (Proceedings - IEEE Computer Security Foundations Symposium; vol. 2023-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2022

    Asymptotically Quasi-Optimal Cryptography

    de Castro, L., Hazay, C., Ishai, Y., Vaikuntanathan, V. & Venkitasubramaniam, M., 2022, Advances in Cryptology – EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2022, Proceedings. Dunkelman, O. & Dziembowski, S. (eds.). Springer Science and Business Media Deutschland GmbH, p. 303-334 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13275 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Financially Backed Covert Security

    Faust, S., Hazay, C., Kretzler, D. & Schlosser, B., 2022, Public-Key Cryptography - PKC 2022 - 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Hanaoka, G., Shikata, J. & Watanabe, Y. (eds.). Springer Science and Business Media Deutschland GmbH, p. 99-129 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13178 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • On Black-Box Constructions of Time and Space Efficient Sublinear Arguments from Symmetric-Key Primitives

    Bangalore, L., Bhadauria, R., Hazay, C. & Venkitasubramaniam, M., 2022, Theory of Cryptography - 20th International Conference, TCC 2022, Proceedings. Kiltz, E. & Vaikuntanathan, V. (eds.). Springer Science and Business Media Deutschland GmbH, p. 417-446 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13747 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Protecting Distributed Primitives Against Leakage: Equivocal Secret Sharing and More

    Hazay, C., Venkitasubramaniam, M. & Weiss, M., 1 Jul 2022, 3rd Conference on Information-Theoretic Cryptography, ITC 2022. Dachman-Soled, D. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 3. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 230).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • SCALES: MPC with Small Clients and Larger Ephemeral Servers

    Acharya, A., Hazay, C., Kolesnikov, V. & Prabhakaran, M., 2022, Theory of Cryptography - 20th International Conference, TCC 2022, Proceedings. Kiltz, E. & Vaikuntanathan, V. (eds.). Springer Science and Business Media Deutschland GmbH, p. 502-531 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13748 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2021

    Diogenes: Lightweight scalable RSA modulus generation with a dishonest majority

    Chen, M., Hazay, C., Ishai, Y., Kashnikov, Y., Micciancio, D., Riviere, T., Shelat, A., Venkitasubramaniam, M. & Wang, R., May 2021, Proceedings - 2021 IEEE Symposium on Security and Privacy, SP 2021. Institute of Electrical and Electronics Engineers Inc., p. 590-607 18 p. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2021-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • Generic Compiler for Publicly Verifiable Covert Multi-Party Computation

    Faust, S., Hazay, C., Kretzler, D. & Schlosser, B., 2021, Advances in Cryptology – EUROCRYPT 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Canteaut, A. & Standaert, F-X. (eds.). Springer Science and Business Media Deutschland GmbH, p. 782-811 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12697 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • ZK-PCPs from leakage-resilient secret sharing

    Hazay, C., Venkitasubramaniam, M. & Weiss, M., 1 Jul 2021, 2nd Conference on Information-Theoretic Cryptography, ITC 2021. Tessaro, S. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 6. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 199).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • 2020

    Going Beyond Dual Execution: MPC for Functions with Efficient Verification

    Hazay, C., Shelat, A. & Venkitasubramaniam, M., 2020, Public-Key Cryptography – PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Kiayias, A., Kohlweiss, M., Wallden, P. & Zikas, V. (eds.). Springer, p. 328-356 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12111 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Gradual gram and secure computation for ram programs

    Hazay, C. & Lilintal, M., 2020, Security and Cryptography for Networks - 12th International Conference, SCN 2020, Proceedings. Galdi, C. & Kolesnikov, V. (eds.). Springer Science and Business Media Deutschland GmbH, p. 233-252 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12238 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Is the Classical GMW Paradigm Practical? The Case of Non-Interactive Actively Secure 2PC

    Abascal, J., Faghihi Sereshgi, M. H., Hazay, C., Ishai, Y. & Venkitasubramaniam, M., 30 Oct 2020, CCS 2020 - Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1591-1605 15 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • Ligero++: A New Optimized Sublinear IOP

    Bhadauria, R., Fang, Z., Hazay, C., Venkitasubramaniam, M., Xie, T. & Zhang, Y., 30 Oct 2020, CCS 2020 - Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2025-2038 14 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    30 Scopus citations
  • Multi-clients verifiable computation via conditional disclosure of secrets

    Bhadauria, R. & Hazay, C., 2020, Security and Cryptography for Networks - 12th International Conference, SCN 2020, Proceedings. Galdi, C. & Kolesnikov, V. (eds.). Springer Science and Business Media Deutschland GmbH, p. 150-171 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12238 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • The Price of Active Security in Cryptographic Protocols

    Hazay, C., Venkitasubramaniam, M. & Weiss, M., 2020, Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Canteaut, A. & Ishai, Y. (eds.). Springer, p. 184-215 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12106 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • Which languages have 4-round fully black-box zero-knowledge arguments from one-way functions?

    Hazay, C., Pass, R. & Venkitasubramaniam, M., 2020, Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Canteaut, A. & Ishai, Y. (eds.). Springer, p. 599-619 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12107 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2019

    Fast actively secure five-party computation with security beyond abort

    Byali, M., Patra, A., Hazay, C. & Singla, S., 6 Nov 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1573-1590 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • Fast Actively Secure Five-Party Computation with Security Beyond Abort

    Hazay, C., Byali, M., Patra, P. & Singla, S., 2019, Proceedings of the ACM Conference on Computer and Communications Security.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Leviosa: Lightweight secure arithmetic computation

    Hazay, C., Marcedone, A., Ishai, Y. & Venkitasubramaniam, M., 6 Nov 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 327-344 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    24 Scopus citations
  • 2018

    Concretely efficient large-scale MPC with active security (or, tinykeys for TinyOT)

    Hazay, C., Orsini, E., Scholl, P. & Soria-Vazquez, E., 2018, Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Peyrin, T. & Galbraith, S. (eds.). Springer Verlag, p. 86-117 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11274 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    10 Scopus citations
  • Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT)

    Hazay, C., Orsini, E., Scholl, P. & Soria-Vazquez, E., 2018, ASIACRYPT.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Round-optimal fully black-box zero-knowledge arguments from one-way permutations

    Hazay, C. & Venkitasubramaniam, M., 2018, Theory of Cryptography - 16th International Conference, TCC 2018, Proceedings. Beimel, A. & Dziembowski, S. (eds.). Springer Verlag, p. 263-285 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11239 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • Round-Optimal Fully Black-Box Zero-Knowledge Arguments from One-Way Permutations,

    Hazay, C. & Venkitasubramaniam, M., 2018, TCC.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Round-optimal secure multi-party computation

    Halevi, S., Hazay, C., Polychroniadou, A. & Venkitasubramaniam, M., 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Boldyreva, A. & Shacham, H. (eds.). Springer Verlag, p. 488-520 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10992 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    20 Scopus citations
  • TinyKeys: A new approach to efficient multi-party computation

    Hazay, C., Orsini, E., Scholl, P. & Soria-Vazquez, E., 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Shacham, H. & Boldyreva, A. (eds.). Springer Verlag, p. 3-33 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10993 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    15 Scopus citations
  • 2017

    Actively secure garbled circuits with constant communication overhead in the plain model

    Hazay, C., Ishai, Y. & Venkitasubramaniam, M., 2017, Theory of Cryptography - 15th International Conference, TCC 2017, Proceedings. Kalai, Y. & Reyzin, L. (eds.). Springer Verlag, p. 3-39 37 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10678 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    12 Scopus citations
  • Constant round adaptively secure protocols in the tamper-proof hardware model

    Hazay, C., Polychroniadou, A. & Venkitasubramaniam, M., 2017, Public-Key Cryptography – PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings. Fehr, S. (ed.). Springer Verlag, p. 428-460 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10175 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Scopus citations
  • Ligero: Lightweight sublinear arguments without a trusted setup

    Ames, S., Hazay, C., Ishai, Y. & Venkitasubramaniam, M., 30 Oct 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2087-2104 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    191 Scopus citations
  • Ligero: Lightweight Sublinear Arguments Without a Trusted Setup

    Hazay, C., Ames, S., Ishai, Y. & Venkitasubramaniam, M., 2017, CCS.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Low cost constant round MPC combining BMR and oblivious transfer

    Hazay, C., Scholl, P. & Soria-Vazquez, E., 2017, Advances in Cryptology – ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Proceedings. Takagi, T. & Peyrin, T. (eds.). Springer Verlag, p. 598-628 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10624 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    40 Scopus citations
  • Scalable multi-party private set-intersection

    Hazay, C. & Venkitasubramaniam, M., 2017, Public-Key Cryptography – PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings. Fehr, S. (ed.). Springer Verlag, p. 175-203 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10174 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    57 Scopus citations
  • 2016

    Composable adaptive secure protocols without setup under polytime assumptions

    Hazay, C. & Venkitasubramaniam, M., 2016, Theory of Cryptography - 14th International Conference, TCC 2016-B, Proceedings. Smith, A. & Hirt, M. (eds.). Springer Verlag, p. 400-432 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9985 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    7 Scopus citations
  • Composable security in the tamper-proof hardware model under minimal complexity

    Hazay, C., Polychroniadou, A. & Venkitasubramaniam, M., 2016, Theory of Cryptography - 14th International Conference, TCC 2016-B, Proceedings. Smith, A. & Hirt, M. (eds.). Springer Verlag, p. 367-399 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9985 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    18 Scopus citations
  • Constant-round maliciously secure two-party computation in the RAM model

    Hazay, C. & Yanai, A., 2016, Theory of Cryptography - 14th International Conference, TCC 2016-B, Proceedings. Smith, A. & Hirt, M. (eds.). Springer Verlag, p. 521-553 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9985 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    8 Scopus citations
  • On the power of secure two-party computation

    Hazay, C. & Venkitasubramaniam, M., 2016, Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings. Robshaw, M. & Katz, J. (eds.). Springer Verlag, p. 397-429 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9815).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    17 Scopus citations
  • The feasibility of outsourced database search in the plain model

    Hazay, C. & Zarosim, H., 2016, Security and Cryptography for Networks - 10th International Conference, SCN 2016, Proceedings. De Prisco, R. & Zikas, V. (eds.). Springer Verlag, p. 313-332 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9841 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • What security can we achieve within 4 rounds?

    Hazay, C. & Venkitasubramaniam, M., 2016, Security and Cryptography for Networks - 10th International Conference, SCN 2016, Proceedings. De Prisco, R. & Zikas, V. (eds.). Springer Verlag, p. 486-505 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9841 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2015

    Adaptively secure computation with partial erasures

    Hazay, C., Lindell, Y. & Patra, A., 21 Jul 2015, PODC 2015 - Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing. Association for Computing Machinery, p. 291-300 10 p. (Proceedings of the Annual ACM Symposium on Principles of Distributed Computing; vol. 2015-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • Oblivious polynomial evaluation and secure set-intersection from algebraic PRFs

    Hazay, C., 2015, Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Proceedings. Dodis, Y. & Nielsen, J. B. (eds.). Springer Verlag, p. 90-120 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9015).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    28 Scopus citations
  • On black-box complexity of universally composable security in the CRS model

    Hazay, C. & Venkitasubramaniam, M., 2015, Advances in Cryptology – ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Iwata, T. & Cheon, J. H. (eds.). Springer Verlag, p. 183-209 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9453).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    9 Scopus citations
  • On Black-Box Complexity of Universally Composable Security in the CRS model

    Hazay, C. & Venkitasubramaniam, M., 2015, ASIACRYPT. Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Selective opening security for receivers

    Hazay, C., Patra, A. & Warinschi, B., 2015, Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, 2015, Proceedings. Cheon, J. H. & Iwata, T. (eds.). Springer Verlag, p. 443-469 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9452).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    24 Scopus citations
  • 2014

    One-sided adaptively secure two-party computation

    Hazay, C. & Patra, A., 2014, Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, Proceedings. Springer Verlag, p. 368-393 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8349 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    11 Scopus citations
  • One-Sided Adaptively Secure Two-Party Computation

    Hazay, C. & Patra, A., 2014, TCC. Springer Berlin Heidelberg

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2013

    Leakage-resilient cryptography from minimal assumptions

    Hazay, C., López-Alt, A., Wee, H. & Wichs, D., 2013, Advances in Cryptology, EUROCRYPT 2013 - 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 160-176 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7881 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    37 Scopus citations
Your message has successfully been sent.
Your message was not sent due to an error.