BibTeX records: S. Dov Gordon

download as .bib file

@inproceedings{DBLP:conf/ccs/GordonLM23,
  author       = {S. Dov Gordon and
                  Phi Hung Le and
                  Daniel McVicker},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {Linear Communication in Malicious Majority {MPC}},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {2173--2187},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3623162},
  doi          = {10.1145/3576915.3623162},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GordonLM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/LiangKBGV22,
  author       = {Mingyu Liang and
                  Ioanna Karantaidou and
                  Foteini Baldimtsi and
                  S. Dov Gordon and
                  Mayank Varia},
  title        = {({\(\in\)}, {\(\delta\)})-Indistinguishable Mixing for Cryptocurrencies},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2022},
  number       = {1},
  pages        = {49--74},
  year         = {2022},
  url          = {https://doi.org/10.2478/popets-2022-0004},
  doi          = {10.2478/POPETS-2022-0004},
  timestamp    = {Mon, 06 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/popets/LiangKBGV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/GordonHL22,
  author       = {S. Dov Gordon and
                  Carmit Hazay and
                  Phi Hung Le},
  title        = {Fully Secure {PSI} via MPC-in-the-Head},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2022},
  number       = {3},
  pages        = {291--313},
  year         = {2022},
  url          = {https://doi.org/10.56553/popets-2022-0073},
  doi          = {10.56553/POPETS-2022-0073},
  timestamp    = {Wed, 27 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/GordonHL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/BaldimtsiCGLM22,
  author       = {Foteini Baldimtsi and
                  Panagiotis Chatzigiannis and
                  S. Dov Gordon and
                  Phi Hung Le and
                  Daniel McVicker},
  title        = {gOTzilla: Efficient Disjunctive Zero-Knowledge Proofs from {MPC} in
                  the Head, with Application to Proofs of Assets in Cryptocurrencies},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2022},
  number       = {4},
  pages        = {229--249},
  year         = {2022},
  url          = {https://doi.org/10.56553/popets-2022-0107},
  doi          = {10.56553/POPETS-2022-0107},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/BaldimtsiCGLM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/GordonKLX22,
  author       = {S. Dov Gordon and
                  Jonathan Katz and
                  Mingyu Liang and
                  Jiayu Xu},
  editor       = {Giuseppe Ateniese and
                  Daniele Venturi},
  title        = {Spreading the Privacy Blanket: - Differentially Oblivious Shuffling
                  for Differential Privacy},
  booktitle    = {Applied Cryptography and Network Security - 20th International Conference,
                  {ACNS} 2022, Rome, Italy, June 20-23, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13269},
  pages        = {501--520},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-09234-3\_25},
  doi          = {10.1007/978-3-031-09234-3\_25},
  timestamp    = {Tue, 21 Jun 2022 15:24:40 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/GordonKLX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/ChoiDGLY22,
  author       = {Seung Geol Choi and
                  Dana Dachman{-}Soled and
                  S. Dov Gordon and
                  Linsheng Liu and
                  Arkady Yerukhimovich},
  editor       = {Eike Kiltz and
                  Vinod Vaikuntanathan},
  title        = {Secure Sampling with Sublinear Communication},
  booktitle    = {Theory of Cryptography - 20th International Conference, {TCC} 2022,
                  Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13748},
  pages        = {348--377},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22365-5\_13},
  doi          = {10.1007/978-3-031-22365-5\_13},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/ChoiDGLY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaldimtsiCGLM22,
  author       = {Foteini Baldimtsi and
                  Panagiotis Chatzigiannis and
                  S. Dov Gordon and
                  Phi Hung Le and
                  Daniel McVicker},
  title        = {gOTzilla: Efficient Disjunctive Zero-Knowledge Proofs from {MPC} in
                  the Head, with Application to Proofs of Assets in Cryptocurrencies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {170},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/170},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BaldimtsiCGLM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GordonHL22,
  author       = {S. Dov Gordon and
                  Carmit Hazay and
                  Phi Hung Le},
  title        = {Fully Secure {PSI} via MPC-in-the-Head},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {379},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/379},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GordonHL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-SoledCG22,
  author       = {Dana Dachman{-}Soled and
                  Seung Geol Choi and
                  S. Dov Gordon and
                  Linsheng Liu and
                  Arkady Yerukhimovich},
  title        = {Secure Sampling with Sublinear Communication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {660},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/660},
  timestamp    = {Mon, 20 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dachman-SoledCG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GordonHLL22,
  author       = {S. Dov Gordon and
                  Carmit Hazay and
                  Phi Hung Le and
                  Mingyu Liang},
  title        = {More Efficient (Reusable) Private Set Union},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {713},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/713},
  timestamp    = {Mon, 20 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GordonHLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GordonLM22,
  author       = {S. Dov Gordon and
                  Phi Hung Le and
                  Daniel McVicker},
  title        = {Linear Communication in Malicious Majority {MPC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {781},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/781},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GordonLM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChoiDGLY21,
  author       = {Seung Geol Choi and
                  Dana Dachman{-}Soled and
                  S. Dov Gordon and
                  Linsheng Liu and
                  Arkady Yerukhimovich},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {Compressed Oblivious Encoding for Homomorphically Encrypted Search},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {2277--2291},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3484792},
  doi          = {10.1145/3460120.3484792},
  timestamp    = {Tue, 16 Nov 2021 12:59:46 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChoiDGLY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GordonSY21,
  author       = {S. Dov Gordon and
                  Daniel Starin and
                  Arkady Yerukhimovich},
  editor       = {Anne Canteaut and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {The More the Merrier: Reducing the Cost of Large Scale {MPC}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12697},
  pages        = {694--723},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-77886-6\_24},
  doi          = {10.1007/978-3-030-77886-6\_24},
  timestamp    = {Mon, 28 Aug 2023 21:17:52 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GordonSY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2109-07708,
  author       = {Seung Geol Choi and
                  Dana Dachman{-}Soled and
                  S. Dov Gordon and
                  Linsheng Liu and
                  Arkady Yerukhimovich},
  title        = {Compressed Oblivious Encoding for Homomorphically Encrypted Search},
  journal      = {CoRR},
  volume       = {abs/2109.07708},
  year         = {2021},
  url          = {https://arxiv.org/abs/2109.07708},
  eprinttype    = {arXiv},
  eprint       = {2109.07708},
  timestamp    = {Wed, 22 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-07708.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GordonSY21,
  author       = {S. Dov Gordon and
                  Daniel Starin and
                  Arkady Yerukhimovich},
  title        = {The More The Merrier: Reducing the Cost of Large Scale {MPC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {303},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/303},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GordonSY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiangKBGV21,
  author       = {Mingyu Liang and
                  Ioanna Karantaidou and
                  Foteini Baldimtsi and
                  S. Dov Gordon and
                  Mayank Varia},
  title        = {({\(\epsilon\)}, {\(\delta\)})-indistinguishable Mixing for Cryptocurrencies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1197},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1197},
  timestamp    = {Fri, 03 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LiangKBGV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoiDGLY21,
  author       = {Seung Geol Choi and
                  Dana Dachman{-}Soled and
                  S. Dov Gordon and
                  Linsheng Liu and
                  Arkady Yerukhimovich},
  title        = {Compressed Oblivious Encoding for Homomorphically Encrypted Search},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1199},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1199},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoiDGLY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GordonKLX21,
  author       = {S. Dov Gordon and
                  Jonathan Katz and
                  Mingyu Liang and
                  Jiayu Xu},
  title        = {Spreading the Privacy Blanket: Differentially Oblivious Shuffling
                  for Differential Privacy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1257},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1257},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GordonKLX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MazloomLRG20,
  author       = {Sahar Mazloom and
                  Phi Hung Le and
                  Samuel Ranellucci and
                  S. Dov Gordon},
  editor       = {Srdjan Capkun and
                  Franziska Roesner},
  title        = {Secure parallel computation on national scale volumes of data},
  booktitle    = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14,
                  2020},
  pages        = {2487--2504},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/usenixsecurity20/presentation/mazloom},
  timestamp    = {Fri, 29 Jan 2021 22:08:55 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/MazloomLRG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Dachman-SoledGL19,
  author       = {Dana Dachman{-}Soled and
                  S. Dov Gordon and
                  Feng{-}Hao Liu and
                  Adam O'Neill and
                  Hong{-}Sheng Zhou},
  title        = {Leakage Resilience from Program Obfuscation},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {3},
  pages        = {742--824},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-018-9286-z},
  doi          = {10.1007/S00145-018-9286-Z},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Dachman-SoledGL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WailsJSYG19,
  author       = {Ryan Wails and
                  Aaron Johnson and
                  Daniel Starin and
                  Arkady Yerukhimovich and
                  S. Dov Gordon},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {Stormy: Statistics in Tor by Measuring Securely},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {615--632},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3345650},
  doi          = {10.1145/3319535.3345650},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/WailsJSYG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LeRG19,
  author       = {Phi Hung Le and
                  Samuel Ranellucci and
                  S. Dov Gordon},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {Two-party Private Set Intersection with an Untrusted Third Party},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {2403--2420},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3345661},
  doi          = {10.1145/3319535.3345661},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LeRG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeRG19,
  author       = {Phi Hung Le and
                  Samuel Ranellucci and
                  S. Dov Gordon},
  title        = {Two-party Private Set Intersection with an Untrusted Third Party},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1338},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1338},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeRG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/GenkinGR18,
  author       = {Daniel Genkin and
                  S. Dov Gordon and
                  Samuel Ranellucci},
  editor       = {Bart Preneel and
                  Frederik Vercauteren},
  title        = {Best of Both Worlds in Secure Computation, with Low Communication
                  Overhead},
  booktitle    = {Applied Cryptography and Network Security - 16th International Conference,
                  {ACNS} 2018, Leuven, Belgium, July 2-4, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10892},
  pages        = {340--359},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93387-0\_18},
  doi          = {10.1007/978-3-319-93387-0\_18},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/GenkinGR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GordonR018,
  author       = {S. Dov Gordon and
                  Samuel Ranellucci and
                  Xiao Wang},
  editor       = {Thomas Peyrin and
                  Steven D. Galbraith},
  title        = {Secure Computation with Low Communication from Cross-Checking},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11274},
  pages        = {59--85},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03332-3\_3},
  doi          = {10.1007/978-3-030-03332-3\_3},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/GordonR018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GordonKW18,
  author       = {S. Dov Gordon and
                  Jonathan Katz and
                  Xiao Wang},
  editor       = {Thomas Peyrin and
                  Steven D. Galbraith},
  title        = {Simple and Efficient Two-Server {ORAM}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11274},
  pages        = {141--157},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03332-3\_6},
  doi          = {10.1007/978-3-030-03332-3\_6},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/GordonKW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MazloomG18,
  author       = {Sahar Mazloom and
                  S. Dov Gordon},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {Secure Computation with Differentially Private Access Patterns},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {490--507},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243851},
  doi          = {10.1145/3243734.3243851},
  timestamp    = {Tue, 10 Nov 2020 20:00:51 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MazloomG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0012GK18,
  author       = {Xiao Wang and
                  S. Dov Gordon and
                  Jonathan Katz},
  title        = {Simple and Efficient Two-Server {ORAM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {5},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/005},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0012GK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GordonR018,
  author       = {S. Dov Gordon and
                  Samuel Ranellucci and
                  Xiao Wang},
  title        = {Secure Computation with Low Communication from Cross-checking},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {216},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/216},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GordonR018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MazloomG17,
  author       = {Sahar Mazloom and
                  S. Dov Gordon},
  title        = {Differentially Private Access Patterns in Secure Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1016},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1016},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MazloomG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/WangGMK16,
  author       = {Xiao Wang and
                  S. Dov Gordon and
                  Allen McIntosh and
                  Jonathan Katz},
  editor       = {Ioannis G. Askoxylakis and
                  Sotiris Ioannidis and
                  Sokratis K. Katsikas and
                  Catherine Meadows},
  title        = {Secure Computation of {MIPS} Machine Code},
  booktitle    = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research
                  in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9879},
  pages        = {99--117},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45741-3\_6},
  doi          = {10.1007/978-3-319-45741-3\_6},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/WangGMK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Dachman-SoledGL16,
  author       = {Dana Dachman{-}Soled and
                  S. Dov Gordon and
                  Feng{-}Hao Liu and
                  Adam O'Neill and
                  Hong{-}Sheng Zhou},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {Leakage-Resilient Public-Key Encryption from Obfuscation},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9615},
  pages        = {101--128},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49387-8\_5},
  doi          = {10.1007/978-3-662-49387-8\_5},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Dachman-SoledGL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-SoledGL16,
  author       = {Dana Dachman{-}Soled and
                  S. Dov Gordon and
                  Feng{-}Hao Liu and
                  Adam O'Neill and
                  Hong{-}Sheng Zhou},
  title        = {Leakage-Resilient Public-Key Encryption from Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {730},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/730},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dachman-SoledGL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GordonLS15,
  author       = {S. Dov Gordon and
                  Feng{-}Hao Liu and
                  Elaine Shi},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Constant-Round {MPC} with Fairness and Guarantee of Output Delivery},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {63--82},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_4},
  doi          = {10.1007/978-3-662-48000-7\_4},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GordonLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GordonKLSZ15,
  author       = {S. Dov Gordon and
                  Jonathan Katz and
                  Feng{-}Hao Liu and
                  Elaine Shi and
                  Hong{-}Sheng Zhou},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {Multi-Client Verifiable Computation with Stronger Security Guarantees},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9015},
  pages        = {144--168},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46497-7\_6},
  doi          = {10.1007/978-3-662-46497-7\_6},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/GordonKLSZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GordonKLSZ15,
  author       = {S. Dov Gordon and
                  Jonathan Katz and
                  Feng{-}Hao Liu and
                  Elaine Shi and
                  Hong{-}Sheng Zhou},
  title        = {Multi-Client Verifiable Computation with Stronger Security Guarantees},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {142},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/142},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GordonKLSZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GordonLS15,
  author       = {S. Dov Gordon and
                  Feng{-}Hao Liu and
                  Elaine Shi},
  title        = {Constant-Round {MPC} with Fairness and Guarantee of Output Delivery},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {371},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/371},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GordonLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangGMK15,
  author       = {Xiao Wang and
                  S. Dov Gordon and
                  Allen McIntosh and
                  Jonathan Katz},
  title        = {Secure Computation of {MIPS} Machine Code},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {547},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/547},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangGMK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/GordonKKY14,
  author       = {S. Dov Gordon and
                  Jonathan Katz and
                  Ranjit Kumaresan and
                  Arkady Yerukhimovich},
  title        = {Authenticated broadcast with a partially compromised public-key infrastructure},
  journal      = {Inf. Comput.},
  volume       = {234},
  pages        = {17--25},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ic.2013.11.003},
  doi          = {10.1016/J.IC.2013.11.003},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/GordonKKY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GoldwasserGG0KLSSZ14,
  author       = {Shafi Goldwasser and
                  S. Dov Gordon and
                  Vipul Goyal and
                  Abhishek Jain and
                  Jonathan Katz and
                  Feng{-}Hao Liu and
                  Amit Sahai and
                  Elaine Shi and
                  Hong{-}Sheng Zhou},
  editor       = {Phong Q. Nguyen and
                  Elisabeth Oswald},
  title        = {Multi-input Functional Encryption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Copenhagen, Denmark, May 11-15, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8441},
  pages        = {578--602},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55220-5\_32},
  doi          = {10.1007/978-3-642-55220-5\_32},
  timestamp    = {Thu, 14 Oct 2021 09:58:16 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GoldwasserGG0KLSSZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GordonMRW13,
  author       = {S. Dov Gordon and
                  Tal Malkin and
                  Mike Rosulek and
                  Hoeteck Wee},
  editor       = {Thomas Johansson and
                  Phong Q. Nguyen},
  title        = {Multi-party Computation of Polynomials and Branching Programs without
                  Simultaneous Interaction},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Athens, Greece, May 26-30, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7881},
  pages        = {575--591},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38348-9\_34},
  doi          = {10.1007/978-3-642-38348-9\_34},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GordonMRW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/AlwenBFGGTW13,
  author       = {Jo{\"{e}}l Alwen and
                  Manuel Barbosa and
                  Pooya Farshim and
                  Rosario Gennaro and
                  S. Dov Gordon and
                  Stefano Tessaro and
                  David A. Wilson},
  editor       = {Martijn Stam},
  title        = {On the Relationship between Functional Encryption, Obfuscation, and
                  Fully Homomorphic Encryption},
  booktitle    = {Cryptography and Coding - 14th {IMA} International Conference, {IMACC}
                  2013, Oxford, UK, December 17-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8308},
  pages        = {65--84},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-45239-0\_5},
  doi          = {10.1007/978-3-642-45239-0\_5},
  timestamp    = {Wed, 18 Mar 2020 16:00:57 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/AlwenBFGGTW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GordonMRW13,
  author       = {S. Dov Gordon and
                  Tal Malkin and
                  Mike Rosulek and
                  Hoeteck Wee},
  title        = {Multi-Party Computation of Polynomials and Branching Programs without
                  Simultaneous Interaction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {267},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/267},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GordonMRW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GordonKLSZ13,
  author       = {S. Dov Gordon and
                  Jonathan Katz and
                  Feng{-}Hao Liu and
                  Elaine Shi and
                  Hong{-}Sheng Zhou},
  title        = {Multi-Input Functional Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {774},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/774},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GordonKLSZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/GordonK12,
  author       = {S. Dov Gordon and
                  Jonathan Katz},
  title        = {Partial Fairness in Secure Two-Party Computation},
  journal      = {J. Cryptol.},
  volume       = {25},
  number       = {1},
  pages        = {14--40},
  year         = {2012},
  url          = {https://doi.org/10.1007/s00145-010-9079-5},
  doi          = {10.1007/S00145-010-9079-5},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/GordonK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GordonKKKM0V12,
  author       = {S. Dov Gordon and
                  Jonathan Katz and
                  Vladimir Kolesnikov and
                  Fernando Krell and
                  Tal Malkin and
                  Mariana Raykova and
                  Yevgeniy Vahlis},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Secure two-party computation in sublinear (amortized) time},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {513--524},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382251},
  doi          = {10.1145/2382196.2382251},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/GordonKKKM0V12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/GordonHKL11,
  author       = {S. Dov Gordon and
                  Carmit Hazay and
                  Jonathan Katz and
                  Yehuda Lindell},
  title        = {Complete Fairness in Secure Two-Party Computation},
  journal      = {J. {ACM}},
  volume       = {58},
  number       = {6},
  pages        = {24:1--24:37},
  year         = {2011},
  url          = {https://doi.org/10.1145/2049697.2049698},
  doi          = {10.1145/2049697.2049698},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jacm/GordonHKL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GordonKV11,
  author       = {S. Dov Gordon and
                  Jonathan Katz and
                  Vinod Vaikuntanathan},
  title        = {A Group Signature Scheme from Lattice Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {60},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/060},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GordonKV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GordonKKMRV11,
  author       = {S. Dov Gordon and
                  Jonathan Katz and
                  Vladimir Kolesnikov and
                  Tal Malkin and
                  Mariana Raykova and
                  Yevgeniy Vahlis},
  title        = {Secure Computation with Sublinear Amortized Work},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {482},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/482},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GordonKKMRV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Gordon10,
  author       = {Samuel Dov Gordon},
  title        = {On Fairness in Secure Computation},
  school       = {University of Maryland, College Park, MD, {USA}},
  year         = {2010},
  url          = {https://hdl.handle.net/1903/11117},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/basesearch/Gordon10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GordonKV10,
  author       = {S. Dov Gordon and
                  Jonathan Katz and
                  Vinod Vaikuntanathan},
  editor       = {Masayuki Abe},
  title        = {A Group Signature Scheme from Lattice Assumptions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 5-9, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6477},
  pages        = {395--412},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17373-8\_23},
  doi          = {10.1007/978-3-642-17373-8\_23},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/GordonKV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GordonK10,
  author       = {S. Dov Gordon and
                  Jonathan Katz},
  editor       = {Henri Gilbert},
  title        = {Partial Fairness in Secure Two-Party Computation},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Monaco / French Riviera, May 30 - June 3, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6110},
  pages        = {157--176},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13190-5\_8},
  doi          = {10.1007/978-3-642-13190-5\_8},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GordonK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/GordonWXY10,
  author       = {S. Dov Gordon and
                  Hoeteck Wee and
                  David Xiao and
                  Arkady Yerukhimovich},
  editor       = {Michel Abdalla and
                  Paulo S. L. M. Barreto},
  title        = {On the Round Complexity of Zero-Knowledge Proofs Based on One-Way
                  Permutations},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2010, First International Conference
                  on Cryptology and Information Security in Latin America, Puebla, Mexico,
                  August 8-11, 2010, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6212},
  pages        = {189--204},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14712-8\_12},
  doi          = {10.1007/978-3-642-14712-8\_12},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/latincrypt/GordonWXY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sss/GordonKKY10,
  author       = {S. Dov Gordon and
                  Jonathan Katz and
                  Ranjit Kumaresan and
                  Arkady Yerukhimovich},
  editor       = {Shlomi Dolev and
                  Jorge Arturo Cobb and
                  Michael J. Fischer and
                  Moti Yung},
  title        = {Authenticated Broadcast with a Partially Compromised Public-Key Infrastructure},
  booktitle    = {Stabilization, Safety, and Security of Distributed Systems - 12th
                  International Symposium, {SSS} 2010, New York, NY, USA, September
                  20-22, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6366},
  pages        = {144--158},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16023-3\_14},
  doi          = {10.1007/978-3-642-16023-3\_14},
  timestamp    = {Sat, 19 Oct 2019 20:07:49 +0200},
  biburl       = {https://dblp.org/rec/conf/sss/GordonKKY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GordonIMOS10,
  author       = {S. Dov Gordon and
                  Yuval Ishai and
                  Tal Moran and
                  Rafail Ostrovsky and
                  Amit Sahai},
  editor       = {Daniele Micciancio},
  title        = {On Complete Primitives for Fairness},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {91--108},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_7},
  doi          = {10.1007/978-3-642-11799-2\_7},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/GordonIMOS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GordonK09,
  author       = {S. Dov Gordon and
                  Jonathan Katz},
  editor       = {Omer Reingold},
  title        = {Complete Fairness in Multi-party Computation without an Honest Majority},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {19--35},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_2},
  doi          = {10.1007/978-3-642-00457-5\_2},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/GordonK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GordonKKY09,
  author       = {S. Dov Gordon and
                  Jonathan Katz and
                  Ranjit Kumaresan and
                  Arkady Yerukhimovich},
  title        = {Authenticated Broadcast with a Partially Compromised Public-Key Infrastructure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {410},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/410},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GordonKKY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/GordonHKL08,
  author       = {S. Dov Gordon and
                  Carmit Hazay and
                  Jonathan Katz and
                  Yehuda Lindell},
  editor       = {Cynthia Dwork},
  title        = {Complete fairness in secure two-party computation},
  booktitle    = {Proceedings of the 40th Annual {ACM} Symposium on Theory of Computing,
                  Victoria, British Columbia, Canada, May 17-20, 2008},
  pages        = {413--422},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1374376.1374436},
  doi          = {10.1145/1374376.1374436},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/GordonHKL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GordonK08,
  author       = {S. Dov Gordon and
                  Jonathan Katz},
  title        = {Partial Fairness in Secure Two-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {206},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/206},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GordonK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GordonHKL08,
  author       = {S. Dov Gordon and
                  Carmit Hazay and
                  Jonathan Katz and
                  Yehuda Lindell},
  title        = {Complete Fairness in Secure Two-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {303},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/303},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GordonHKL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GordonK08a,
  author       = {S. Dov Gordon and
                  Jonathan Katz},
  title        = {Complete Fairness in Multi-Party Computation Without an Honest Majority},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {458},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/458},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GordonK08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/GordonK06,
  author       = {S. Dov Gordon and
                  Jonathan Katz},
  editor       = {Roberto De Prisco and
                  Moti Yung},
  title        = {Rational Secret Sharing, Revisited},
  booktitle    = {Security and Cryptography for Networks, 5th International Conference,
                  {SCN} 2006, Maiori, Italy, September 6-8, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4116},
  pages        = {229--241},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11832072\_16},
  doi          = {10.1007/11832072\_16},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/GordonK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GordonK06,
  author       = {S. Dov Gordon and
                  Jonathan Katz},
  title        = {Rational Secret Sharing, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {142},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/142},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GordonK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics