Publisher
Springer International Publishing
Reference46 articles.
1. Lecture Notes in Computer Science;A Afshar,2015
2. Beaver, D., Micali, S., Rogaway, P.: The round complexity of secure protocols (extended abstract). In: STOC, pp. 503–513 (1990)
3. Chung, K.-M., Pass, R.: A simple ORAM. IACR Cryptology ePrint Archive 2013/243 (2013)
4. Cook, S.A., Reckhow, R.A.: Time-bounded random access machines. In: STOC, pp. 73–80 (1972)
5. Lecture Notes in Computer Science;I Damgård,2013
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献