Cryptology ePrint Archive: Report 2010/079
Available versions in chronological order
20100216:093231 (posted 16-Feb-2010 09:32:31 UTC)
Modular Design of Efficient Secure Function Evaluation Protocols
Vladimir Kolesnikov and Ahmad-Reza Sadeghi and Thomas Schneider
20100412:173142 (posted 12-Apr-2010 17:31:42 UTC)
Modular Design of Efficient Secure Function Evaluation Protocols
Vladimir Kolesnikov and Ahmad-Reza Sadeghi and Thomas Schneider
20100413:084459 (posted 13-Apr-2010 08:44:59 UTC)
Modular Design of Efficient Secure Function Evaluation Protocols
Vladimir Kolesnikov and Ahmad-Reza Sadeghi and Thomas Schneider
20101120:104650 (posted 20-Nov-2010 10:46:50 UTC)
From Dust to Dawn: Practically Efficient Two-Party Secure Function Evaluation Protocols and their Modular Design
Vladimir Kolesnikov and Ahmad-Reza Sadeghi and Thomas Schneider
20130403:133152 (posted 03-Apr-2013 13:31:52 UTC)
From Dust to Dawn: Practically Efficient Two-Party Secure Function Evaluation Protocols and their Modular Design
Vladimir Kolesnikov and Ahmad-Reza Sadeghi and Thomas Schneider
Publication Info: An updated version of this paper is published in Journal of Computer Security (JCS), 21(2):283-315, 2013 entitled "A systematic approach to practically efficient general two-party secure function evaluation protocols and their modular design"
20130403:133231 (posted 03-Apr-2013 13:32:31 UTC)
From Dust to Dawn: Practically Efficient Two-Party Secure Function Evaluation Protocols and their Modular Design
Vladimir Kolesnikov and Ahmad-Reza Sadeghi and Thomas Schneider
Publication Info: An updated version of this paper is published in Journal of Computer Security (JCS), 21(2):283-315, 2013 entitled "A systematic approach to practically efficient general two-party secure function evaluation protocols and their modular design"
20130403:133354 (posted 03-Apr-2013 13:33:54 UTC)
From Dust to Dawn: Practically Efficient Two-Party Secure Function Evaluation Protocols and their Modular Design
Vladimir Kolesnikov and Ahmad-Reza Sadeghi and Thomas Schneider
Publication Info: An updated version of this article is published in the Journal of Computer Security (see note below)
[
Cryptology ePrint archive
]