Canetti, Ran; Poburinnaya, Oxana; Venkitasubramaniam, Muthuramakrishnan Equivocating Yao: constant-round adaptively secure multiparty computation in the plain model. (English) Zbl 1512.94068 SIAM J. Comput. 51, No. 2, STOC17-333-STOC17-399 (2022). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Canetti} et al., SIAM J. Comput. 51, No. 2, STOC17--333-STOC17--399 (2022; Zbl 1512.94068) Full Text: DOI
Canetti, Ran; Fuller, Benjamin; Paneth, Omer; Reyzin, Leonid; Smith, Adam Reusable fuzzy extractors for low-entropy distributions. (English) Zbl 1466.94021 J. Cryptology 34, No. 1, Paper No. 2, 33 p. (2021). MSC: 94A60 94A62 94D05 PDFBibTeX XMLCite \textit{R. Canetti} et al., J. Cryptology 34, No. 1, Paper No. 2, 33 p. (2021; Zbl 1466.94021) Full Text: DOI Link
Canetti, Ran; Chen, Yilei; Reyzin, Leonid; Rothblum, Ron D. Fiat-Shamir and correlation intractability from strong KDM-secure encryption. (English) Zbl 1423.94058 Nielsen, Jesper Buus (ed.) et al., Advances in cryptology – EUROCRYPT 2018. 37th annual international conference on the theory and applications of cryptographic techniques, Tel Aviv, Israel, April 29 – May 3, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10820, 91-122 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Canetti} et al., Lect. Notes Comput. Sci. 10820, 91--122 (2018; Zbl 1423.94058) Full Text: DOI
Canetti, Ran; Cheung, Ling; Kaynar, Dilsun; Liskov, Moses; Lynch, Nancy; Pereira, Olivier; Segala, Roberto Task-structured probabilistic I/O automata. (English) Zbl 1390.68382 J. Comput. Syst. Sci. 94, 63-97 (2018). MSC: 68Q45 68Q87 PDFBibTeX XMLCite \textit{R. Canetti} et al., J. Comput. Syst. Sci. 94, 63--97 (2018; Zbl 1390.68382) Full Text: DOI
Bitansky, Nir; Canetti, Ran; Chiesa, Alessandro; Goldwasser, Shafi; Lin, Huijia; Rubinstein, Aviad; Tromer, Eran The hunting of the SNARK. (English) Zbl 1386.94066 J. Cryptology 30, No. 4, 989-1066 (2017). MSC: 94A60 68Q05 68Q10 PDFBibTeX XMLCite \textit{N. Bitansky} et al., J. Cryptology 30, No. 4, 989--1066 (2017; Zbl 1386.94066) Full Text: DOI
Asharov, Gilad; Canetti, Ran; Hazay, Carmit Toward a game theoretic view of secure computation. (English) Zbl 1365.94475 J. Cryptology 29, No. 4, 879-926 (2016). MSC: 94A62 68M12 91A80 PDFBibTeX XMLCite \textit{G. Asharov} et al., J. Cryptology 29, No. 4, 879--926 (2016; Zbl 1365.94475) Full Text: DOI
Canetti, Ran; Lin, Huijia; Pass, Rafael Adaptive hardness and composable security in the plain model from standard assumptions. (English) Zbl 1406.94033 SIAM J. Comput. 45, No. 5, 1793-1834 (2016). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{R. Canetti} et al., SIAM J. Comput. 45, No. 5, 1793--1834 (2016; Zbl 1406.94033) Full Text: DOI
Canetti, Ran; Herzog, Jonathan Universally composable symbolic security analysis. (English) Zbl 1208.94039 J. Cryptology 24, No. 1, 83-147 (2011). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{R. Canetti} and \textit{J. Herzog}, J. Cryptology 24, No. 1, 83--147 (2011; Zbl 1208.94039) Full Text: DOI