Filter
Journal article

Search results

  • 2024

    Efficient Maliciously Secure Oblivious Exponentiations

    Baum, C., Berlips, J., Chen, W., Damgård, I. B., Esvelt, K. M., Foner, L., Gretton, D., Kysel, M., Rivest, R. L., Roy, L., Sage-Ling, F., Shamir, A., Vaikuntanathan, V., Van Hauwe, L., Vogel, T., Weinstein-Raun, B., Wichs, D., Wooster, S., Yao, A. C. & Yu, Y., 2024, In: IACR Communications in Cryptology. 1, 3, 25 p.

    Research output: Contribution to journalJournal articleResearchpeer-review

    Open Access
    File
    1 Downloads (Orbit)
  • 2023

    Sok: vector OLE-based zero-knowledge protocols

    Baum, C., Dittmer, S., Scholl, P. & Wang, X., 2023, In: Designs, Codes, and Cryptography. 35 p.

    Research output: Contribution to journalJournal articleResearchpeer-review

    Open Access
    File
    116 Downloads (Orbit)