31![“FEEEEEEED ME!” L ong before the words “cult movie” existed, Roger Corman’s 1960 film The Little Shop of Horrors “FEEEEEEED ME!” L ong before the words “cult movie” existed, Roger Corman’s 1960 film The Little Shop of Horrors](https://www.pdfsearch.io/img/dd539eb85b6cdd793fdcac0f013f7fe0.jpg) | Add to Reading ListSource URL: www.kritzerland.comLanguage: English - Date: 2013-08-14 13:31:10
|
---|
32![A Game-Theoretic Framework for Analyzing Trust-Inference Protocols Ruggero Morselli∗ Jonathan Katz∗ A Game-Theoretic Framework for Analyzing Trust-Inference Protocols Ruggero Morselli∗ Jonathan Katz∗](https://www.pdfsearch.io/img/19dca54920c04ac4cab1b077415de24b.jpg) | Add to Reading ListSource URL: www.eecs.harvard.eduLanguage: English - Date: 2004-05-31 19:56:00
|
---|
33![Complete Fairness in Secure Two-Party Computation∗ S. Dov Gordon Carmit Hazay Jonathan Katz Complete Fairness in Secure Two-Party Computation∗ S. Dov Gordon Carmit Hazay Jonathan Katz](https://www.pdfsearch.io/img/3533f3b579fa9e00be9f4d40dc9b0690.jpg) | Add to Reading ListSource URL: www.wisdom.weizmann.ac.ilLanguage: English - Date: 2008-07-05 10:54:06
|
---|
34![Collusion-Free Multiparty Computation in the Mediated Model∗ Jonathan Katz† Yehuda Lindell‡ Collusion-Free Multiparty Computation in the Mediated Model∗ Jonathan Katz† Yehuda Lindell‡](https://www.pdfsearch.io/img/ee3a65d8322001b49681aa405fa18297.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2008-12-19 12:33:08
|
---|
35![Rare & Raw February 15, 2013- March 31, 2013 Co-curated by Steph Rogerson and Kelly McCray. Rare & Raw February 15, 2013- March 31, 2013 Co-curated by Steph Rogerson and Kelly McCray.](https://www.pdfsearch.io/img/e9c93d1241506d0a2a14d63edea248a6.jpg) | Add to Reading ListSource URL: www.leslielohman.orgLanguage: English - Date: 2014-11-05 18:08:55
|
---|
36![A Chosen Ciphertext Attack Against Several E-Mail Encryption Protocols Jonathan Katz∗ Bruce Schneier† A Chosen Ciphertext Attack Against Several E-Mail Encryption Protocols Jonathan Katz∗ Bruce Schneier†](https://www.pdfsearch.io/img/715d61d99b4bad8c722fd9d1a203ad46.jpg) | Add to Reading ListSource URL: www.schneier.comLanguage: English - Date: 2014-03-02 23:18:30
|
---|
37![Automated Analysis and Synthesis of Block-Cipher Modes of Operation Alex J. Malozemoff Jonathan Katz Automated Analysis and Synthesis of Block-Cipher Modes of Operation Alex J. Malozemoff Jonathan Katz](https://www.pdfsearch.io/img/0e4962e90e9b85f4eefb5154c6927586.jpg) | Add to Reading ListSource URL: www.cs.umd.eduLanguage: English - Date: 2014-05-16 05:57:05
|
---|
38![Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS Seung Geol Choi∗ Jonathan Katz† Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS Seung Geol Choi∗ Jonathan Katz†](https://www.pdfsearch.io/img/8ecad326fff1b005ad040e28820cf0c2.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2014-05-14 14:54:31
|
---|
39![On Achieving the “Best of Both Worlds” in Secure Multiparty Computation∗ Jonathan Katz† Abstract Two settings are typically considered for secure multiparty computation, depending on On Achieving the “Best of Both Worlds” in Secure Multiparty Computation∗ Jonathan Katz† Abstract Two settings are typically considered for secure multiparty computation, depending on](https://www.pdfsearch.io/img/2cfc8027dc5f35fd41fdb9b890fa54c4.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2007-01-08 13:33:41
|
---|
40![Reducing Complexity Assumptions for Statistically-Hiding Commitment Omer Horvitz∗† Jonathan Katz∗‡ Ruggero Morselli∗ Reducing Complexity Assumptions for Statistically-Hiding Commitment Omer Horvitz∗† Jonathan Katz∗‡ Ruggero Morselli∗](https://www.pdfsearch.io/img/68ac75729e1feaafe62c054b90e2c9df.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2005-03-18 14:35:48
|
---|