Acharya, Anasuya; Hazay, Carmit; Kolesnikov, Vladimir; Prabhakaran, Manoj SCALES. MPC with small clients and larger ephemeral servers. (English) Zbl 1528.68047 Kiltz, Eike (ed.) et al., Theory of cryptography. 20th international conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13748, 502-531 (2023). MSC: 68M25 68M14 94A60 PDFBibTeX XMLCite \textit{A. Acharya} et al., Lect. Notes Comput. Sci. 13748, 502--531 (2023; Zbl 1528.68047) Full Text: DOI
Hazay, Carmit; Venkitasubramaniam, Muthuramakrishnan What security can we achieve within 4 rounds? (English) Zbl 1436.94071 J. Cryptology 32, No. 4, 1200-1262 (2019). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{C. Hazay} and \textit{M. Venkitasubramaniam}, J. Cryptology 32, No. 4, 1200--1262 (2019; Zbl 1436.94071) Full Text: DOI
Hazay, Carmit; Polychroniadou, Antigoni; Venkitasubramaniam, Muthuramakrishnan Constant round adaptively secure protocols in the tamper-proof hardware model. (English) Zbl 1400.94149 Fehr, Serge (ed.), Public-key cryptography – PKC 2017. 20th IACR international conference on practice and theory in public-key cryptography, Amsterdam, The Netherlands, March 28–31, 2017. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-54387-0/pbk; 978-3-662-54388-7/ebook). Lecture Notes in Computer Science 10175, 428-460 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{C. Hazay} et al., Lect. Notes Comput. Sci. 10175, 428--460 (2017; Zbl 1400.94149) Full Text: DOI
Hazay, Carmit; Polychroniadou, Antigoni; Venkitasubramaniam, Muthuramakrishnan Composable security in the tamper-proof hardware model under minimal complexity. (English) Zbl 1406.94060 Hirt, Martin (ed.) et al., Theory of cryptography. 14th international conference, TCC 2016-B, Beijing, China, October 31 – November 3, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53640-7/pbk; 978-3-662-53641-4/ebook). Lecture Notes in Computer Science 9985, 367-399 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{C. Hazay} et al., Lect. Notes Comput. Sci. 9985, 367--399 (2016; Zbl 1406.94060) Full Text: DOI
Hazay, Carmit; Venkitasubramaniam, Muthuramakrishnan What security can we achieve within 4 rounds? (English) Zbl 1435.94130 Zikas, Vassilis (ed.) et al., Security and cryptography for networks. 10th international conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9841, 486-505 (2016). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{C. Hazay} and \textit{M. Venkitasubramaniam}, Lect. Notes Comput. Sci. 9841, 486--505 (2016; Zbl 1435.94130) Full Text: DOI
Hazay, Carmit; Zarosim, Hila The feasibility of outsourced database search in the plain model. (English) Zbl 1478.68075 Zikas, Vassilis (ed.) et al., Security and cryptography for networks. 10th international conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9841, 313-332 (2016). MSC: 68P15 68M12 68M14 68M25 PDFBibTeX XMLCite \textit{C. Hazay} and \textit{H. Zarosim}, Lect. Notes Comput. Sci. 9841, 313--332 (2016; Zbl 1478.68075) Full Text: DOI
Hazay, Carmit; López-Alt, Adriana; Wee, Hoeteck; Wichs, Daniel Leakage-resilient cryptography from minimal assumptions. (English) Zbl 1348.94054 J. Cryptology 29, No. 3, 514-551 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{C. Hazay} et al., J. Cryptology 29, No. 3, 514--551 (2016; Zbl 1348.94054) Full Text: DOI
Faust, Sebastian; Hazay, Carmit; Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Zottarel, Angela Signature schemes secure against hard-to-invert leakage. (English) Zbl 1355.94053 J. Cryptology 29, No. 2, 422-455 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Faust} et al., J. Cryptology 29, No. 2, 422--455 (2016; Zbl 1355.94053) Full Text: DOI