Author:
Li Hong-Da,Yang Xiong,Feng Deng-Guo,Li Bao
Publisher
Springer Science and Business Media LLC
Subject
Computational Theory and Mathematics,Computer Science Applications,Hardware and Architecture,Theoretical Computer Science,Software
Reference21 articles.
1. Canetti R. Studies in secure multi-party computation and applications [Dissertation]. ftp://theory.lcs.mit.edu/pub/tcryptol/B03/thesis.ps.Z
2. Canetti R. Universally composable security: A new paradigm for cryptographic protocols. http://eprint.iacr.org/2000/067.
3. Canetti R. Security and composition of multi-party cryptographic protocols.Journal of Cryptology, 2000, 13(1): 143–202.
4. Canetti R, Feige U, Goldreich O, Naor M. Adaptively secure multi-party computation. InProc. 28th ACM Symp. Theory of Computing, Philadelphia, Pennsylvania, 1996, pp.639–648.
5. Canetti R, Damgård I, Dziembowski S, Ishai Y, Malkin T. On adaptive vs. non-adaptive security of multiparty protocols.Advance in Cryptology-EUROCRYPT 2001, Birgit Pfitzmann (ed.),LNCS 2045, pp.262–279.
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献