Cryptology ePrint Archive: Report 2010/079

Available versions in chronological order


Modular Design of Efficient Secure Function Evaluation Protocols
Vladimir Kolesnikov and Ahmad-Reza Sadeghi and Thomas Schneider

Modular Design of Efficient Secure Function Evaluation Protocols
Vladimir Kolesnikov and Ahmad-Reza Sadeghi and Thomas Schneider

Modular Design of Efficient Secure Function Evaluation Protocols
Vladimir Kolesnikov and Ahmad-Reza Sadeghi and Thomas Schneider

From Dust to Dawn: Practically Efficient Two-Party Secure Function Evaluation Protocols and their Modular Design
Vladimir Kolesnikov and Ahmad-Reza Sadeghi and Thomas Schneider

From Dust to Dawn: Practically Efficient Two-Party Secure Function Evaluation Protocols and their Modular Design
Vladimir Kolesnikov and Ahmad-Reza Sadeghi and Thomas Schneider
Publication Info: An updated version of this paper is published in Journal of Computer Security (JCS), 21(2):283-315, 2013 entitled "A systematic approach to practically efficient general two-party secure function evaluation protocols and their modular design"

From Dust to Dawn: Practically Efficient Two-Party Secure Function Evaluation Protocols and their Modular Design
Vladimir Kolesnikov and Ahmad-Reza Sadeghi and Thomas Schneider
Publication Info: An updated version of this paper is published in Journal of Computer Security (JCS), 21(2):283-315, 2013 entitled "A systematic approach to practically efficient general two-party secure function evaluation protocols and their modular design"

From Dust to Dawn: Practically Efficient Two-Party Secure Function Evaluation Protocols and their Modular Design
Vladimir Kolesnikov and Ahmad-Reza Sadeghi and Thomas Schneider
Publication Info: An updated version of this article is published in the Journal of Computer Security (see note below)


[ Cryptology ePrint archive ]