Biblio

Export 3 results:
Filters: Author is Abhi Shelat  [Clear All Filters]
2016
Zhu R, Huang Y, Katz J, Shelat A.  2016.  The Cut-and-Choose Game and Its Application to Cryptographic Protocols. 25th USENIX Security Symposium (USENIX Security 16). :1085--1100.
2013
Kreuter B, Shelat A, Mood B, Butler K.  2013.  PCF: A Portable Circuit Format for Scalable Two-Party Secure Computation. 22nd USENIX Security Symposium (USENIX Security 13). :321--336.
2012
Kreuter B, Shelat A, Shen C-hao.  2012.  Billion-Gate Secure Computation with Malicious Adversaries. 21st USENIX Security Symposium (USENIX Security 12). :285--300.