Follow
Ran Cohen
Ran Cohen
Reichman University (aka IDC Herzliya)
Verified email at runi.ac.il - Homepage
Title
Cited by
Cited by
Year
Fairness versus guaranteed output delivery in secure multiparty computation
R Cohen, Y Lindell
Journal of Cryptology 30 (4), 1157-1186, 2017
902017
Probabilistic termination and composability of cryptographic protocols
R Cohen, S Coretti, J Garay, V Zikas
Journal of Cryptology 32 (3), 690-741, 2019
552019
Multiparty generation of an RSA modulus
M Chen, J Doerner, Y Kondi, E Lee, S Rosefield, A Shelat, R Cohen
Journal of Cryptology 35 (2), 12, 2022
382022
Asynchronous secure multiparty computation in constant time
R Cohen
Public-Key Cryptography--PKC 2016, 183-207, 2016
352016
Breaking the -Bit Barrier: Byzantine Agreement with Polylog Bits Per Party
E Boyle, R Cohen, A Goel
Journal of Cryptology 37 (1), 2, 2024
292024
Characterization of secure multiparty computation without broadcast
R Cohen, I Haitner, E Omri, L Rotem
Journal of Cryptology 31, 587-609, 2018
292018
Round-preserving parallel composition of probabilistic-termination cryptographic protocols
R Cohen, S Coretti, J Garay, V Zikas
Journal of Cryptology 34, 1-57, 2021
282021
Adaptively Secure MPC with Sublinear Communication Complexity
R Cohen, A Shelat, D Wichs
Journal of Cryptology 36 (2), 11, 2023
27*2023
Broadcast-optimal two-round MPC
R Cohen, J Garay, V Zikas
Advances in Cryptology–EUROCRYPT 2020: 39th Annual International Conference …, 2020
232020
Must the communication graph of MPC protocols be an expander?
E Boyle, R Cohen, D Data, P Hubáček
Journal of Cryptology 36 (3), 20, 2023
222023
On the round complexity of randomized byzantine agreement
R Cohen, I Haitner, N Makriyannis, M Orland, A Samorodnitsky
Journal of Cryptology 35 (2), 10, 2022
212022
From fairness to full security in multiparty computation
R Cohen, I Haitner, E Omri, L Rotem
Journal of Cryptology 35 (1), 4, 2022
15*2022
Completeness theorems for adaptively secure broadcast
R Cohen, J Garay, V Zikas
Annual International Cryptology Conference, 3-38, 2023
11*2023
Is information-theoretic topology-hiding computation possible?
M Ball, E Boyle, R Cohen, T Malkin, T Moran
Theory of Cryptography: 17th International Conference, TCC 2019, Nuremberg …, 2019
82019
Static vs. adaptive security in perfect MPC: a separation and the adaptive security of BGW
G Asharov, R Cohen, O Shochat
Cryptology ePrint Archive, 2022
72022
On adaptively secure multiparty computation with a short CRS
R Cohen, C Peikert
International Conference on Security and Cryptography for Networks, 129-146, 2016
72016
Topology-hiding communication from minimal assumptions
M Ball, E Boyle, R Cohen, L Kohl, T Malkin, P Meyer, T Moran
Journal of Cryptology 36 (4), 39, 2023
62023
Communication Lower Bounds for Cryptographic Broadcast Protocols
E Blum, E Boyle, R Cohen, CD Liu-Zhang
arXiv preprint arXiv:2309.01466, 2023
42023
Guaranteed Output in Rounds for Round-Robin Sampling Protocols
R Cohen, J Doerner, Y Kondi, A Shelat
Annual International Conference on the Theory and Applications of …, 2022
42022
Concurrent asynchronous byzantine agreement in expected-constant rounds, revisited
R Cohen, P Forghani, J Garay, R Patel, V Zikas
Theory of Cryptography Conference, 422-451, 2023
32023
The system can't perform the operation now. Try again later.
Articles 1–20