Pinkas

Results: 36



#Item
21Electronic documents / Key management / Man-in-the-middle attack / Communications protocol / Digital signature / Trusted third party / Certified email / Public key infrastructure / Return receipt / Cryptography / Email / Public-key cryptography

Certified Email with a Light On-line Trusted Third Party: Design and Implementation ∗ Mart´ın Abadi

Add to Reading List

Source URL: www.pinkas.net

Language: English - Date: 2003-01-11 00:09:21
22Secure two-party computation / Communication complexity / Oblivious transfer / IP / Communications protocol / Public-key cryptography / Commitment scheme / Verifiable secret sharing / Cryptography / Cryptographic protocols / Secure multi-party computation

Secure Computation of the kth-Ranked Element Gagan Aggarwal? , Nina Mishra?? , and Benny Pinkas? ? ? Abstract. Given two or more parties possessing large, confidential datasets, we consider the problem of securely comput

Add to Reading List

Source URL: www.pinkas.net

Language: English - Date: 2004-05-12 12:29:01
23Computing / Secure multi-party computation / Secure two-party computation / Pseudorandom generator / Circuit / Boolean circuit / Transmission Control Protocol / Computer / Actor model / Cryptographic protocols / Theoretical computer science / Applied mathematics

FairplayMP – A System for Secure Multi-Party Computation Assaf Ben-David∗ Noam Nisan∗ Benny Pinkas†

Add to Reading List

Source URL: www.cs.huji.ac.il

Language: English - Date: 2008-09-03 07:33:47
24Secure communication / Data / Internet protocols / Internet standards / Public-key cryptography / Transport Layer Security / Cipher suite / SSL acceleration / HTTP Secure / Cryptography / Cryptographic protocols / Computing

The Design and Implementation of Protocol-Based Hidden Key Recovery Eu-Jin Goh1 , Dan Boneh1 , Benny Pinkas2 , and Philippe Golle1 1 Stanford University

Add to Reading List

Source URL: www.pinkas.net

Language: English - Date: 2003-12-20 00:37:24
25Secure multi-party computation / Communications protocol / Oblivious transfer / Homomorphic encryption / Transmission Control Protocol / Public-key cryptography / Hamming / Port / Cryptography / Cryptographic protocols / Secure two-party computation

Secure Hamming Distance Based Computation and Its Applications Ayman Jarrous and Benny Pinkas University of Haifa Abstract. This paper examines secure two-party computation of functions which depend only on the Hamming

Add to Reading List

Source URL: www.pinkas.net

Language: English - Date: 2009-04-09 09:23:00
26Internet protocols / Data / Private information retrieval / Oblivious transfer / Port / X Window System / Internet privacy / Cryptographic protocols / Computing / Software

Keyword Search and Oblivious Pseudorandom Functions Michael J. Freedman1 , Yuval Ishai2 , Benny Pinkas3 , and Omer Reingold4 1 New York University ([removed])

Add to Reading List

Source URL: www.pinkas.net

Language: English - Date: 2004-12-05 02:46:25
27Cryptography / Computing / Secure two-party computation / Communications protocol / Commitment scheme / Secure multi-party computation / Oblivious transfer / Port / Transmission Control Protocol / Cryptographic protocols / Data / Information

Secure Computation of Functionalities based on Hamming Distance and its Application to Computing Document Similarity Ayman Jarrous1 and Benny Pinkas2,* 1 2

Add to Reading List

Source URL: www.pinkas.net

Language: English - Date: 2013-09-16 05:33:14
28Digital circuits / Cryptographic protocols / Mathematics / Computational complexity theory / Secure multi-party computation / Boolean circuit / Multiplexer / Circuit / Boolean algebra / Theoretical computer science / Computing / Algebraic logic

Fairplay — A Secure Two-Party Computation System Dahlia Malkhi1 , Noam Nisan1 , Benny Pinkas2 , and Yaron Sella1 1 The School of Computer Science and Engineering The Hebrew University of Jerusalem

Add to Reading List

Source URL: www.pinkas.net

Language: English - Date: 2004-07-02 10:26:47
29B-tree / Computing / Cryptography / Computer programming / Data management / Chord / Distributed hash table / Distributed data storage / Key management / Public-key cryptography

Efficient State Updates for Key Management Benny Pinkas HP Labs Princeton, NJ, USA [removed] Abstract

Add to Reading List

Source URL: www.pinkas.net

Language: English - Date: 2004-05-25 23:26:43
30Internet standards / Internet protocols / Key management / Transport Layer Security / Certificate authority / X.509 / Man-in-the-middle attack / DigiNotar / Domain Name System Security Extensions / Cryptography / Public-key cryptography / Cryptographic protocols

Firm Grip Handshakes: a Tool for Bidirectional Vouching Omer Berkman∗ Benny Pinkas†

Add to Reading List

Source URL: www.pinkas.net

Language: English - Date: 2013-02-01 08:45:46
UPDATE