What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Ran Cohen
Google Scholar
ORCID:
0000-0002-1293-552X
31
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/joc
Guaranteed Output in $O(\sqrt{n})$ Rounds for Round-Robin Sampling Protocols.
Ran Cohen
Jack Doerner
Yashvanth Kondi
Abhi Shelat
2025
conf/eurocrypt
Peeking Into the Future: MPC Resilient to Super-Rushing Adversaries.
Gilad Asharov
Anirudh Chandramouli
Ran Cohen
Yuval Ishai
2024
journals/joc
Breaking the $O(\sqrt{n})$-Bit Barrier: Byzantine Agreement with Polylog Bits Per Party.
Elette Boyle
Ran Cohen
Aarushi Goel
2024
conf/crypto
Secure Multiparty Computation with Identifiable Abort via Vindicating Release.
Ran Cohen
Jack Doerner
Yashvanth Kondi
Abhi Shelat
2024
conf/fc
Efficient Agreement Over Byzantine Gossip.
Ran Cohen
Julian Loss
Tal Moran
2023
journals/joc
Must the Communication Graph of MPC Protocols be an Expander?
Elette Boyle
Ran Cohen
Deepesh Data
Pavel Hubácek
2023
journals/joc
On the Power of an Honest Majority in Three-Party Computation Without Broadcast.
Bar Alon
Ran Cohen
Eran Omri
Tom Suad
2023
journals/joc
Topology-Hiding Communication from Minimal Assumptions.
Marshall Ball
Elette Boyle
Ran Cohen
Lisa Kohl
Tal Malkin
Pierre Meyer
Tal Moran
2023
journals/joc
Adaptively Secure MPC with Sublinear Communication Complexity.
Ran Cohen
Abhi Shelat
Daniel Wichs
2023
conf/crypto
Completeness Theorems for Adaptively Secure Broadcast.
Ran Cohen
Juan A. Garay
Vassilis Zikas
2023
conf/tcc
Locally Verifiable Distributed SNARGs.
Eden Aldema Tshuva
Elette Boyle
Ran Cohen
Tal Moran
Rotem Oshman
2023
conf/tcc
Concurrent Asynchronous Byzantine Agreement in Expected-Constant Rounds, Revisited.
Ran Cohen
Pouyan Forghani
Juan A. Garay
Rutvik Patel
Vassilis Zikas
2022
journals/joc
On the Round Complexity of Randomized Byzantine Agreement.
Ran Cohen
Iftach Haitner
Nikolaos Makriyannis
Matan Orland
Alex Samorodnitsky
2022
journals/joc
From Fairness to Full Security in Multiparty Computation.
Ran Cohen
Iftach Haitner
Eran Omri
Lior Rotem
2022
journals/joc
Multiparty Generation of an RSA Modulus.
Megan Chen
Jack Doerner
Yashvanth Kondi
Eysa Lee
Schuyler Rosefield
Abhi Shelat
Ran Cohen
2022
conf/eurocrypt
Guaranteed Output in $O(\sqrt{n})$ Rounds for Round-Robin Sampling Protocols.
Ran Cohen
Jack Doerner
Yashvanth Kondi
Abhi Shelat
2021
journals/joc
Round-Preserving Parallel Composition of Probabilistic-Termination Cryptographic Protocols.
Ran Cohen
Sandro Coretti
Juan A. Garay
Vassilis Zikas
2020
conf/crypto
Multiparty Generation of an RSA Modulus.
Megan Chen
Ran Cohen
Jack Doerner
Yashvanth Kondi
Eysa Lee
Schuyler Rosefield
Abhi Shelat
2020
conf/eurocrypt
Broadcast-Optimal Two-Round MPC.
Ran Cohen
Juan A. Garay
Vassilis Zikas
2020
conf/tcc
On the Power of an Honest Majority in Three-Party Computation Without Broadcast.
Bar Alon
Ran Cohen
Eran Omri
Tom Suad
2020
conf/tcc
Topology-Hiding Communication from Minimal Assumptions.
Marshall Ball
Elette Boyle
Ran Cohen
Lisa Kohl
Tal Malkin
Pierre Meyer
Tal Moran
2019
journals/joc
Probabilistic Termination and Composability of Cryptographic Protocols.
Ran Cohen
Sandro Coretti
Juan A. Garay
Vassilis Zikas
2019
conf/crypto
Adaptively Secure MPC with Sublinear Communication Complexity.
Ran Cohen
Abhi Shelat
Daniel Wichs
2019
conf/tcc
Is Information-Theoretic Topology-Hiding Computation Possible?
Marshall Ball
Elette Boyle
Ran Cohen
Tal Malkin
Tal Moran
2018
journals/joc
Characterization of Secure Multiparty Computation Without Broadcast.
Ran Cohen
Iftach Haitner
Eran Omri
Lior Rotem
2018
conf/crypto
Must the Communication Graph of MPC Protocols be an Expander?
Elette Boyle
Ran Cohen
Deepesh Data
Pavel Hubácek
2017
journals/joc
Fairness Versus Guaranteed Output Delivery in Secure Multiparty Computation.
Ran Cohen
Yehuda Lindell
2016
conf/crypto
Probabilistic Termination and Composability of Cryptographic Protocols.
Ran Cohen
Sandro Coretti
Juan A. Garay
Vassilis Zikas
2016
conf/pkc
Asynchronous Secure Multiparty Computation in Constant Time.
Ran Cohen
2016
conf/tcc
Characterization of Secure Multiparty Computation Without Broadcast.
Ran Cohen
Iftach Haitner
Eran Omri
Lior Rotem
2014
conf/asiacrypt
Fairness versus Guaranteed Output Delivery in Secure Multiparty Computation.
Ran Cohen
Yehuda Lindell
Coauthors
Aarushi Goel
(1)
Abhi Shelat
(7)
Alex Samorodnitsky
(1)
Anirudh Chandramouli
(1)
Bar Alon
(2)
Daniel Wichs
(2)
Deepesh Data
(2)
Eden Aldema Tshuva
(1)
Elette Boyle
(7)
Eran Omri
(5)
Eysa Lee
(2)
Gilad Asharov
(1)
Iftach Haitner
(4)
Jack Doerner
(5)
Juan A. Garay
(6)
Julian Loss
(1)
Lior Rotem
(3)
Lisa Kohl
(2)
Marshall Ball
(3)
Matan Orland
(1)
Megan Chen
(2)
Nikolaos Makriyannis
(1)
Pavel Hubácek
(2)
Pierre Meyer
(2)
Pouyan Forghani
(1)
Ran Cohen
(31)
Rotem Oshman
(1)
Rutvik Patel
(1)
Sandro Coretti
(3)
Schuyler Rosefield
(2)
Tal Malkin
(3)
Tal Moran
(5)
Tom Suad
(2)
Vassilis Zikas
(6)
Yashvanth Kondi
(5)
Yehuda Lindell
(2)
Yuval Ishai
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to