Filter
Conference contribution

Search results

  • 2016

    Composable adaptive secure protocols without setup under polytime assumptions

    Hazay, C. & Venkitasubramaniam, M., 2016, Theory of Cryptography - 14th International Conference, TCC 2016-B, Proceedings. Smith, A. & Hirt, M. (eds.). Springer Verlag, p. 400-432 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9985 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Scopus citations
  • Composable security in the tamper-proof hardware model under minimal complexity

    Hazay, C., Polychroniadou, A. & Venkitasubramaniam, M., 2016, Theory of Cryptography - 14th International Conference, TCC 2016-B, Proceedings. Smith, A. & Hirt, M. (eds.). Springer Verlag, p. 367-399 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9985 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    18 Scopus citations
  • Constant-round maliciously secure two-party computation in the RAM model

    Hazay, C. & Yanai, A., 2016, Theory of Cryptography - 14th International Conference, TCC 2016-B, Proceedings. Smith, A. & Hirt, M. (eds.). Springer Verlag, p. 521-553 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9985 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Scopus citations
  • On the power of secure two-party computation

    Hazay, C. & Venkitasubramaniam, M., 2016, Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings. Robshaw, M. & Katz, J. (eds.). Springer Verlag, p. 397-429 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9815).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    21 Scopus citations
  • The feasibility of outsourced database search in the plain model

    Hazay, C. & Zarosim, H., 2016, Security and Cryptography for Networks - 10th International Conference, SCN 2016, Proceedings. De Prisco, R. & Zikas, V. (eds.). Springer Verlag, p. 313-332 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9841 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • What security can we achieve within 4 rounds?

    Hazay, C. & Venkitasubramaniam, M., 2016, Security and Cryptography for Networks - 10th International Conference, SCN 2016, Proceedings. De Prisco, R. & Zikas, V. (eds.). Springer Verlag, p. 486-505 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9841 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2015

    Adaptively secure computation with partial erasures

    Hazay, C., Lindell, Y. & Patra, A., 21 Jul 2015, PODC 2015 - Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing. Association for Computing Machinery, p. 291-300 10 p. (Proceedings of the Annual ACM Symposium on Principles of Distributed Computing; vol. 2015-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • Oblivious polynomial evaluation and secure set-intersection from algebraic PRFs

    Hazay, C., 2015, Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Proceedings. Dodis, Y. & Nielsen, J. B. (eds.). Springer Verlag, p. 90-120 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9015).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    30 Scopus citations
  • On black-box complexity of universally composable security in the CRS model

    Hazay, C. & Venkitasubramaniam, M., 2015, Advances in Cryptology – ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Iwata, T. & Cheon, J. H. (eds.). Springer Verlag, p. 183-209 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9453).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • On Black-Box Complexity of Universally Composable Security in the CRS model

    Hazay, C. & Venkitasubramaniam, M., 2015, ASIACRYPT. Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Selective opening security for receivers

    Hazay, C., Patra, A. & Warinschi, B., 2015, Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, 2015, Proceedings. Cheon, J. H. & Iwata, T. (eds.). Springer Verlag, p. 443-469 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9452).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    28 Scopus citations
  • 2014

    One-sided adaptively secure two-party computation

    Hazay, C. & Patra, A., 2014, Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, Proceedings. Springer Verlag, p. 368-393 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8349 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    12 Scopus citations
  • One-Sided Adaptively Secure Two-Party Computation

    Hazay, C. & Patra, A., 2014, TCC. Springer Berlin Heidelberg

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2013

    Leakage-resilient cryptography from minimal assumptions

    Hazay, C., López-Alt, A., Wee, H. & Wichs, D., 2013, Advances in Cryptology, EUROCRYPT 2013 - 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 160-176 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7881 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    39 Scopus citations
  • Outsourced pattern matching

    Faust, S., Hazay, C. & Venturi, D., 2013, Automata, Languages, and Programming - 40th International Colloquium, ICALP 2013, Proceedings. PART 2 ed. p. 545-556 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7966 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    24 Scopus citations
  • Outsourced Pattern Matching

    Faust, S., Hazay, C. & Venturi, D., 2013, ICALP.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2012

    Distributed public key schemes secure against continual leakage

    Akavia, A., Goldwasser, S. & Hazay, C., 2012, PODC'12 - Proceedings of the 2012 ACM Symposium on Principles of Distributed Computing. p. 155-164 10 p. (Proceedings of the Annual ACM Symposium on Principles of Distributed Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    16 Scopus citations
  • Distributed Public Key Schemes Secure against Continual Leakage

    Akavia, A., Goldwasser, S. & Hazay, C., 2012, PODC.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Efficient RSA Key Generation and Threshold Paillier in the Two-Party

    Hazay, C., Mikkelsen, G. L., Rabin, T. & Toft, T., 2012, RSA.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Efficient RSA key generation and threshold Paillier in the two-party setting

    Hazay, C., Mikkelsen, G. L., Rabin, T. & Toft, T., 2012, Topics in Cryptology, CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, Proceedings. p. 313-331 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7178 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    57 Scopus citations
  • Secure two-party computation with low communication

    Damgård, I., Faust, S. & Hazay, C., 2012, Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Proceedings. p. 54-74 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7194 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    67 Scopus citations
  • Secure Two-Party Computation with Low Communication

    Damgård, I., Faust, S. & Hazay, C., 2012, TCC.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Signature schemes secure against hard-to-invert leakage

    Faust, S., Hazay, C., Nielsen, J. B., Nordholt, P. S. & Zottarel, A., 2012, Advances in Cryptology, ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. p. 98-115 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7658 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    28 Scopus citations
  • Signature Schemes Secure against Hard-to-Invert Leakage

    Faust, S., Hazay, C., Nielsen, J. B., Nordholt, P. S. & Zottarel, A., 2012, ASIACRYPT.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2011

    Towards a game theoretic view of secure computation

    Asharov, G., Canetti, R. & Hazay, C., 2011, Advances in Cryptology - EUROCRYPT 2011, 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 426-445 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6632 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    65 Scopus citations
  • 2010

    Computationally secure pattern matching in the presence of malicious adversaries

    Hazay, C. & Toft, T., 2010, Advances in Cryptology, ASIACRYPT 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Springer Verlag, p. 195-212 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6477 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    56 Scopus citations
  • Computationally Secure Pattern Matching in the Presence of Malicious Adversaries

    Hazay, C. & Toft, T., 2010, ASIACRYPT.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Efficient set operations in the presence of malicious adversaries

    Hazay, C. & Nissim, K., 2010, Public Key Cryptography, PKC 2010 - 13th International Conference on Practice and Theory in Public Key Cryptography, Proceedings. p. 312-331 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6056 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    88 Scopus citations
  • Text search protocols with simulation based security

    Gennaro, R., Hazay, C. & Sorensen, J. S., 2010, Public Key Cryptography, PKC 2010 - 13th International Conference on Practice and Theory in Public Key Cryptography, Proceedings. p. 332-350 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6056 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    37 Scopus citations
  • Text Search Protocols with Simulation Based Security

    Gennaro, R., Hazay, C. & Sorensen, J. F., 2010, PKC.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2009

    On compression of data encrypted with block ciphers

    Klinc, D., Hazay, C., Jagmohan, A., Krawczyk, H. & Rabin, T., 2009, Proceedings - 2009 Data Compression Conference, DCC 2009. p. 213-222 10 p. 4976465. (Proceedings - 2009 Data Compression Conference, DCC 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • 2008

    Complete fairness in secure two-party computation

    Dov Gordon, S., Hazay, C., Lindell, Y. & Katz, J., 2008, STOC'08: Proceedings of the 2008 ACM Symposium on Theory of Computing. p. 413-422 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    76 Scopus citations
  • Complete Fairness in Secure Two-Party Computation

    Gordon, S. D., Hazay, C., Katz, J. & Lindell, Y., 2008, 0th annual ACM symposium on Theory of computing.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Complete Fairness in Secure Two-Party Computation

    Gordon, S. D., Hazay, C., Katz, J. & Lindell, Y., 2008, STOC.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Constructions of truly practical secure protocols using standard smartcards

    Hazay, C. & Lindell, Y., 2008, Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS'08. p. 491-500 10 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    49 Scopus citations
  • Constructions of Truly Practical Secure Protocols using Standard Smartcards

    Hazay, C. & Lindell, Y., 2008, CCS.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries

    Hazay, C. & Lindell, Y., 2008, Theory of Cryptography - Fifth Theory of Cryptography Conference, TCC 2008, Proceedings. p. 155-175 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4948 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    200 Scopus citations
  • Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries

    Hazay, C. & Lindell, Y., 2008, TCC.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2007

    Concurrently-secure blind signatures without random oracles or setup assumptions

    Hazay, C., Katz, J., Koo, C. Y. & Lindell, Y., 2007, Theory of Cryptography - 4th Theory of Cryptography Conference, TCC 2007, Proceedings. Springer Verlag, p. 323-341 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4392 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    38 Scopus citations
  • Concurrently-Secure Blind Signatures without Random Oracles or Setup Assumptions

    Hazay, C., Katz, J., Koo, C. Y. & Lindell, Y., 2007, TCC.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2005

    Faster Algorithm for 2D parameterized Matching

    Hazay, C., Lewenstein, M. & Tzur, D., 2005, CPM.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2004

    Approximate parameterized matching

    Hazay, C., Lewenstein, M. & Sokol, D., 2004, ESA.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Your message has successfully been sent.
Your message was not sent due to an error.