Jonathan Katz

Results: 377



#Item
31“FEEEEEEED ME!” L ong before the words “cult movie” existed, Roger Corman’s 1960 film The Little Shop of Horrors

“FEEEEEEED ME!” L ong before the words “cult movie” existed, Roger Corman’s 1960 film The Little Shop of Horrors

Add to Reading List

Source URL: www.kritzerland.com

Language: English - Date: 2013-08-14 13:31:10
32A Game-Theoretic Framework for Analyzing Trust-Inference Protocols Ruggero Morselli∗ Jonathan Katz∗

A Game-Theoretic Framework for Analyzing Trust-Inference Protocols Ruggero Morselli∗ Jonathan Katz∗

Add to Reading List

Source URL: www.eecs.harvard.edu

Language: English - Date: 2004-05-31 19:56:00
33Complete Fairness in Secure Two-Party Computation∗ S. Dov Gordon Carmit Hazay  Jonathan Katz

Complete Fairness in Secure Two-Party Computation∗ S. Dov Gordon Carmit Hazay Jonathan Katz

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2008-07-05 10:54:06
34Collusion-Free Multiparty Computation in the Mediated Model∗ Jonathan Katz† Yehuda Lindell‡

Collusion-Free Multiparty Computation in the Mediated Model∗ Jonathan Katz† Yehuda Lindell‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-19 12:33:08
35Rare & Raw February 15, 2013- March 31, 2013 Co-curated by Steph Rogerson and Kelly McCray.

Rare & Raw February 15, 2013- March 31, 2013 Co-curated by Steph Rogerson and Kelly McCray.

Add to Reading List

Source URL: www.leslielohman.org

Language: English - Date: 2014-11-05 18:08:55
36A Chosen Ciphertext Attack Against Several E-Mail Encryption Protocols Jonathan Katz∗ Bruce Schneier†

A Chosen Ciphertext Attack Against Several E-Mail Encryption Protocols Jonathan Katz∗ Bruce Schneier†

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
37Automated Analysis and Synthesis of Block-Cipher Modes of Operation Alex J. Malozemoff Jonathan Katz

Automated Analysis and Synthesis of Block-Cipher Modes of Operation Alex J. Malozemoff Jonathan Katz

Add to Reading List

Source URL: www.cs.umd.edu

Language: English - Date: 2014-05-16 05:57:05
38Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS Seung Geol Choi∗ Jonathan Katz†

Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS Seung Geol Choi∗ Jonathan Katz†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-05-14 14:54:31
39On Achieving the “Best of Both Worlds” in Secure Multiparty Computation∗ Jonathan Katz† Abstract Two settings are typically considered for secure multiparty computation, depending on

On Achieving the “Best of Both Worlds” in Secure Multiparty Computation∗ Jonathan Katz† Abstract Two settings are typically considered for secure multiparty computation, depending on

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-01-08 13:33:41
40Reducing Complexity Assumptions for Statistically-Hiding Commitment Omer Horvitz∗† Jonathan Katz∗‡ Ruggero Morselli∗

Reducing Complexity Assumptions for Statistically-Hiding Commitment Omer Horvitz∗† Jonathan Katz∗‡ Ruggero Morselli∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-03-18 14:35:48