Seguir
S. Dov Gordon
S. Dov Gordon
Dirección de correo verificada de gmu.edu - Página principal
Título
Citado por
Citado por
Año
Multi-input functional encryption
S Goldwasser, SD Gordon, V Goyal, A Jain, J Katz, FH Liu, A Sahai, E Shi, ...
Advances in Cryptology–EUROCRYPT 2014: 33rd Annual International Conference …, 2014
4162014
A group signature scheme from lattice assumptions
SD Gordon, J Katz, V Vaikuntanathan
Advances in Cryptology-ASIACRYPT 2010: 16th International Conference on the …, 2010
2892010
Rational secret sharing, revisited
SD Gordon, J Katz
Security and Cryptography for Networks: 5th International Conference, SCN …, 2006
2622006
Secure two-party computation in sublinear (amortized) time
SD Gordon, J Katz, V Kolesnikov, F Krell, T Malkin, M Raykova, Y Vahlis
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
2042012
Complete fairness in secure two-party computation
SD Gordon, C Hazay, J Katz, Y Lindell
Journal of the ACM (JACM) 58 (6), 1-37, 2011
2022011
Partial fairness in secure two-party computation
SD Gordon, J Katz
Journal of cryptology 25 (1), 14-40, 2012
1252012
Partial fairness in secure two-party computation
SD Gordon, J Katz
Journal of cryptology 25 (1), 14-40, 2012
1252012
Constant-round MPC with fairness and guarantee of output delivery
S Dov Gordon, FH Liu, E Shi
Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015
992015
Multi-client verifiable computation with stronger security guarantees
SD Gordon, J Katz, FH Liu, E Shi, HS Zhou
Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015 …, 2015
642015
Secure computation with differentially private access patterns
S Mazloom, SD Gordon
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
62*2018
On complete primitives for fairness
D Gordon, Y Ishai, T Moran, R Ostrovsky, A Sahai
Theory of Cryptography: 7th Theory of Cryptography Conference, TCC 2010 …, 2010
542010
Complete fairness in multi-party computation without an honest majority
SD Gordon, J Katz
Theory of Cryptography Conference, 19-35, 2009
542009
Multi-input functional encryption
SD Gordon, J Katz, FH Liu, E Shi, HS Zhou
Cryptology ePrint Archive, 2013
522013
On the relationship between functional encryption, obfuscation, and fully homomorphic encryption
J Alwen, M Barbosa, P Farshim, R Gennaro, SD Gordon, S Tessaro, ...
Cryptography and Coding: 14th IMA International Conference, IMACC 2013 …, 2013
482013
Secure computation with low communication from cross-checking
SD Gordon, S Ranellucci, X Wang
Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018
412018
Two-party private set intersection with an untrusted third party
PH Le, S Ranellucci, SD Gordon
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
402019
Simple and efficient two-server ORAM
SD Gordon, J Katz, X Wang
Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018
38*2018
Secure computation of MIPS machine code
X Wang, SD Gordon, A McIntosh, J Katz
Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016
362016
Multi-party computation of polynomials and branching programs without simultaneous interaction
SD Gordon, T Malkin, M Rosulek, H Wee
Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013
352013
Compressed oblivious encoding for homomorphically encrypted search
SG Choi, D Dachman-Soled, SD Gordon, L Liu, A Yerukhimovich
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
222021
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20