Properties (49)
Predicate | Object |
---|---|
gptkbp:instanceOf |
Person
|
gptkbp:affiliation |
gptkb:Columbia_University
|
gptkbp:contribution |
Secure Multi-Party Computation
Cryptographic Protocols Digital_Signatures |
gptkbp:education |
PhD_in_Computer_Science
|
https://www.w3.org/2000/01/rdf-schema#label |
Yevgeniy Dodis
|
gptkbp:knownFor |
Cryptography
|
gptkbp:notableFeature |
gptkb:Katherine_E._Stinson
|
gptkbp:occupation |
Computer_Scientist
|
gptkbp:publications |
Efficient Cryptographic Protocols
Secure Multi-Party Computation with Malicious Adversaries Cryptographic Techniques for Secure Multi-Party Computation Secure Multi-Party Computation: Techniques and Applications Cryptographic Protocols for Secure Computation Secure Multi-Party Computation: A Survey Secure Multi-Party Computation: A Comprehensive Survey Cryptographic Protocols for Secure Multi-Party Computation Secure Computation in the Presence of Malicious Adversaries Advances in Cryptography Cryptographic Protocols for Secure Communication Advances in Cryptographic Protocols Advances in Cryptographic Techniques. Advances in Secure Computation Advances in Secure Multi-Party Computation Cryptographic Protocols: A Comprehensive Survey Cryptographic Techniques: A Comprehensive Survey Cryptographic Protocols for Secure Communication in the Presence of Malicious Adversaries Secure Computation: A Comprehensive Survey Secure Computation: Techniques and Applications Cryptographic Protocols: Techniques and Applications Cryptographic Protocols for Secure Communication: A Comprehensive Survey Cryptographic Protocols for Secure Computation in the Presence of Malicious Adversaries Foundations_of_Cryptography Cryptographic_Techniques_for_Secure_Communication:_A_Comprehensive_Survey Cryptographic_Techniques_for_Secure_Communication Digital_Signatures:_A_Comprehensive_Survey Digital_Signatures:_A_Survey Digital_Signatures:_Techniques_and_Applications Foundations_of_Secure_Computation Foundations_of_Cryptography:_A_Comprehensive_Survey On_the_Security_of_Digital_Signatures Theoretical_Foundations_of_Cryptography Theoretical_Foundations_of_Secure_Computation Foundations_of_Cryptography:_Techniques_and_Applications Digital_Signatures:_Techniques_and_Applications_in_Cryptography Foundations_of_Secure_Computation:_A_Comprehensive_Survey |
gptkbp:researchAreas |
Information Security
|
gptkbp:studentSupportServices |
Moti Yung
|