S. Dov Gordon
S. Dov Gordon
Geverifieerd e-mailadres voor gmu.edu - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Multi-input functional encryption
S Goldwasser, SD Gordon, V Goyal, A Jain, J Katz, FH Liu, A Sahai, E Shi, ...
Annual International Conference on the Theory and Applications of …, 2014
2922014
Rational secret sharing, revisited
SD Gordon, J Katz
International Conference on Security and Cryptography for Networks, 229-241, 2006
2382006
A group signature scheme from lattice assumptions
SD Gordon, J Katz, V Vaikuntanathan
International conference on the theory and application of cryptology and …, 2010
2172010
Complete fairness in secure two-party computation
SD Gordon, C Hazay, J Katz, Y Lindell
Journal of the ACM (JACM) 58 (6), 1-37, 2011
1812011
Secure two-party computation in sublinear (amortized) time
SD Gordon, J Katz, V Kolesnikov, F Krell, T Malkin, M Raykova, Y Vahlis
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1632012
Partial fairness in secure two-party computation
SD Gordon, J Katz
Annual International Conference on the Theory and Applications of …, 2010
852010
Constant-round MPC with fairness and guarantee of output delivery
SD Gordon, FH Liu, E Shi
Annual Cryptology Conference, 63-82, 2015
572015
Multi-client verifiable computation with stronger security guarantees
SD Gordon, J Katz, FH Liu, E Shi, HS Zhou
Theory of Cryptography Conference, 144-168, 2015
532015
Complete fairness in multi-party computation without an honest majority
SD Gordon, J Katz
Theory of Cryptography Conference, 19-35, 2009
452009
On complete primitives for fairness
D Gordon, Y Ishai, T Moran, R Ostrovsky, A Sahai
Theory of Cryptography Conference, 91-108, 2010
402010
Multi-Input Functional Encryption.
SD Gordon, J Katz, FH Liu, E Shi, HS Zhou
IACR Cryptol. ePrint Arch. 2013, 774, 2013
382013
On the relationship between functional encryption, obfuscation, and fully homomorphic encryption
J Alwen, M Barbosa, P Farshim, R Gennaro, SD Gordon, S Tessaro, ...
IMA International Conference on Cryptography and Coding, 65-84, 2013
372013
Partial fairness in secure two-party computation
SD Gordon, J Katz
Journal of cryptology 25 (1), 14-40, 2012
312012
Partial fairness in secure two-party computation
SD Gordon, J Katz
Journal of cryptology 25 (1), 14-40, 2012
312012
Secure computation of MIPS machine code
X Wang, SD Gordon, A McIntosh, J Katz
European Symposium on Research in Computer Security, 99-117, 2016
262016
Secure computation with differentially private access patterns
S Mazloom, SD Gordon
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
22*2018
Multi-party computation of polynomials and branching programs without simultaneous interaction
SD Gordon, T Malkin, M Rosulek, H Wee
Annual International Conference on the Theory and Applications of …, 2013
202013
Secure computation with low communication from cross-checking
SD Gordon, S Ranellucci, X Wang
International Conference on the Theory and Application of Cryptology and …, 2018
182018
On fairness in secure computation
SD Gordon
152010
Simple and efficient two-server ORAM
SD Gordon, J Katz, X Wang
International Conference on the Theory and Application of Cryptology and …, 2018
132018
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20