Volgen
Ben Riva
Ben Riva
Curv
Geverifieerd e-mailadres voor curv.co - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Practical delegation of computation using multiple servers
R Canetti, B Riva, GN Rothblum
Proceedings of the 18th ACM conference on Computer and communications …, 2011
1502011
Salus: a system for server-aided secure function evaluation
S Kamara, P Mohassel, B Riva
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1122012
Two protocols for delegation of computation
R Canetti, B Riva, G Rothblum
Information Theoretic Security, 37-61, 2012
102*2012
Non-interactive secure computation based on cut-and-choose
A Afshar, P Mohassel, B Pinkas, B Riva
Annual International Conference on the Theory and Applications of …, 2014
1012014
Cut-and-choose Yao-based secure computation in the online/offline and batch settings
Y Lindell, B Riva
Annual Cryptology Conference, 476-494, 2014
982014
Blazing fast 2PC in the offline/online setting with security for malicious adversaries
Y Lindell, B Riva
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
832015
Garbled circuits checking garbled circuits: More efficient and secure two-party computation
P Mohassel, B Riva
Annual Cryptology Conference, 36-53, 2013
692013
A New Implementation of a Dual (Paper and Cryptographic) Voting System
J Ben-Nun, N Farhi, M Llewellyn, B Riva, A Rosen, A Ta-Shma, ...
Proceedings of the 5th Conference on Electronic Voting 2012, 2012
68*2012
Refereed delegation of computation
R Canetti, B Riva, GN Rothblum
Information and Computation 226, 16-36, 2013
55*2013
Efficient Server-Aided 2PC for Mobile Phones.
P Mohassel, O Orobets, B Riva
Proc. Priv. Enhancing Technol. 2016 (2), 82-99, 2016
272016
Bare-handed electronic voting with pre-processing
B Riva, A Ta-Shma
Tel Aviv University, 2008
232008
Richer efficiency/security trade-offs in 2PC
V Kolesnikov, P Mohassel, B Riva, M Rosulek
Theory of Cryptography Conference, 229-259, 2015
172015
Techniques for securing digital signatures using multi-party computation
D Yadlin, R Ben, A Navon, L Pachmanov, J Katz
US Patent App. 16/524,692, 2020
62020
Techniques for securing application programming interface requests using multi-party digital signatures
D Yadlin, R Ben, A Navon, L Pachmanov, J Katz
US Patent App. 16/404,218, 2020
12020
Techniques for single round multi-party computation for digital signatures
D Yadlin, R Ben, A Navon, L Pachmanov, J Katz
US Patent App. 17/019,807, 2022
2022
Nerus: Vulnerability Mitigation Via OS-Aided, Self-Imposed Restrictions
R Canetti, I Itzhaki, B Riva
2012
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–16