Author:
Goudarzi Dahmun,Joux Antoine,Rivain Matthieu
Publisher
Springer International Publishing
Reference24 articles.
1. Ajtai, M.: Secure computation with information leaking to an adversary. In: Fortnow, L., Vadhan, S.P. (eds.) 43rd ACM STOC, pp. 715–724. ACM Press, June 2011
2. Lecture Notes in Computer Science;M Andrychowicz,2015
3. Lecture Notes in Computer Science;M Andrychowicz,2016
4. Lecture Notes in Computer Science;A Battistello,2016
5. Lecture Notes in Computer Science;S Belaïd,2016
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献