Publisher
Springer International Publishing
Reference43 articles.
1. Alwen J, Cachin C, Nielsen JB, Pereira O, Sadeghi AR, Schomakers B, Shelat A, Visconti I (2007) D.PROVI.7 summary report on rational cryptographic protocols (01 Jan 2007), Mar
2. Ashwin Kumar M, Goundan PR, Srinathan K, Pandu Rangan C (2002) On perfectly secure communication over arbitrary networks. In: PODC ’02: proceedings of the twenty-first annual symposium on principles of distributed computing. ACM, New York, pp 193–202.
https://doi.org/10.1145/571825.571858
3. Buchmann J, Ding J (eds) (2008) Post-quantum cryptography. Lecture notes in computer science 5299. Springer, Cham
4. Campanelli M, Gennaro R (2017) Efficient rational proofs for space bounded computations. In: Rass S, An B, Kiekintveld C, Fang F, Schauer S (eds) Decision and game theory for security, pp 53–73. Springer International Publishing, Cham
5. Carter JL, Wegman MN (1981) Universal classes of hashing functions. J Comput Syst Sci 22:265–279