Information-Theoretically Secure Protocols and Security under Composition

LindellYehuda , KushilevitzEyal , RabinTal
SIAM Journal on Computing

140
2010
Secure multiparty computation for privacy-preserving data mining

Lindell Yehuda , Pinkas Benny
J. of Privacy and Confidentiality 1 ( 1)

22
2009
Privacy preserving data mining

Lindell Yehuda , Pinkas Benny
Journal of cryptology 15 ( 3) 177Y206 -177Y206

18
2000
Multiparty computation method, apparatus and program

Toshinori Araki , Kazuma Ohara , Jun Furukawa , Lindell Yehuda

1
2022
905
2005
Cryptography and Security-Article 24 (37 pages)-Complete Fairness in Secure Two-Party Computation

SD Gordon , C Hazay , J Katz , Y Lindell
Journal of the ACM-Association for ComputingMachinery 58 ( 6)

2011
Resettably-Sound Zero-Knowledge and its Applications (preliminary full version of this work)

B Barak , O Goldreich , S Goldwasser , Y Lindell
Available at ePrint: http://eprint. iacr. org

2
Communications-Session 3. Association rules and text mining-TextVis: An Integrated Visual Environment for Text Mining

D Landau , R Feldman , O Zamir , Y Aumann
Lecture Notes in Computer Science 1510 56 -64

1
1998
2019
The Journal of Privacy and Confidentiality

Rejoinder M Anderson , W Seltzer , Y Lindell , B Pinkas
The Journal 1 ( 1)

2009
Impossibility Results for Concurrent Secure Two-Party Computation (Brief Announcement)

Y Lindell
PROCEEDINGS OF THE ANNUAL ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING 22 200 -200

2003
Fast mining of spatial collocations.

A Tiwari , RK Gupta , DP Agrawal , R Agrawal
Information Technology Journal 9 ( 7) pp: 207 -216

1993
Attacks on the pairing protocol of Bluetooth v2. 1

Andrew Y Lindell
Black Hat USA, Las Vegas, Nevada

54
2008
1
2009