Search

Your search keyword '"Omri, Eran"' showing total 142 results

Search Constraints

Start Over You searched for: Author "Omri, Eran" Remove constraint Author: "Omri, Eran"
142 results on '"Omri, Eran"'

Search Results

1. New Upper Bounds for Evolving Secret Sharing via Infinite Branching Programs

2. PINE: Efficient Norm-Bound Verification for Secret-Shared Vectors

4. Can Alice and Bob Guarantee Output to Carol?

5. MPC for Tech Giants (GMPC): Enabling Gulliver and the Lilliputians to Cooperate Amicably

6. From Fairness to Full Security in Multiparty Computation

7. On the Complexity of Fair Coin Flipping

8. Computational Two-Party Correlation: A Dichotomy for Key-Agreement Protocols

9. Tighter Bounds on Multi-Party Coin Flipping via Augmented Weak Martingales and Differentially Private Sampling

10. Characterization of Secure Multiparty Computation Without Broadcast

12. Three Party Secure Computation with Friends and Foes

17. On Perfectly Secure Two-Party Computation for Symmetric Functionalities with Correlated Randomness

19. Large Scale, Actively Secure Computation from LPN and Free-XOR Garbled Circuits

20. On the Power of an Honest Majority in Three-Party Computation Without Broadcast

21. MPC with Friends and Foes

23. Rainbow matchings and algebras of sets

24. COMPLETE CHARACTERIZATION OF FAIRNESS IN SECURE TWO-PARTY COMPUTATION OF BOOLEAN FUNCTIONS.

26. Turbospeedz: Double Your Online SPDZ! Improving SPDZ Using Function Dependent Preprocessing

27. Optimizing Budget Allocation in Graphs

30. From Fairness to Full Security in Multiparty Computation

31. Efficient Scalable Multiparty Private Set-Intersection via Garbled Bloom Filters

32. On the Complexity of Fair Coin Flipping

33. Distributed Private Data Analysis: On Simultaneously Solving How and What

34. Secure Multiparty Computation with Partial Fairness

37. Efficient Scalable Constant-Round MPC via Garbled Circuits

38. The Threshold for Ackermannian Ramsey numbers

39. Almost-Optimally Fair Multiparty Coin-Tossing with Nearly Three-Quarters Malicious

40. Characterization of Secure Multiparty Computation Without Broadcast

43. Parallel Hashing via List Recoverability

44. Complete Characterization of Fairness in Secure Two-Party Computation of Boolean Functions

50. Limits on the Usefulness of Random Oracles

Catalog

Books, media, physical & digital resources