Secure two-party threshold ECDSA from ECDSA assumptions J Doerner, Y Kondi, E Lee, A Shelat 2018 IEEE Symposium on Security and Privacy (SP), 980-997, 2018 | 60 | 2018 |
Threshold ECDSA from ECDSA assumptions: the multiparty case J Doerner, Y Kondi, E Lee, A Shelat 2019 IEEE Symposium on Security and Privacy (SP), 1051-1066, 2019 | 22 | 2019 |
abhi shelat. Threshold ECDSA from ECDSA assumptions: The multiparty case J Doerner, Y Kondi, E Lee IEEE S&P, 2019 | 6 | 2019 |
Signature schemes with randomized verification C Freitag, R Goyal, S Hohenberger, V Koppula, E Lee, T Okamoto, J Tran, ... International Conference on Applied Cryptography and Network Security, 373-389, 2017 | 3 | 2017 |
Multiparty Generation of an RSA Modulus M Chen, R Cohen, J Doerner, Y Kondi, E Lee, S Rosefield, A Shelat Annual International Cryptology Conference, 64-93, 2020 | 1 | 2020 |
Circuit Amortization Friendly Encodingsand Their Application to Statistically Secure Multiparty Computation A Dalskov, E Lee, E Soria-Vazquez International Conference on the Theory and Application of Cryptology and …, 2020 | | 2020 |