Author:
Brakerski Zvika,Branco Pedro,Döttling Nico,Garg Sanjam,Malavolta Giulio
Publisher
Springer International Publishing
Reference23 articles.
1. Lecture Notes in Computer Science;D Beaver,1997
2. Lecture Notes in Computer Science;E Boyle,2016
3. Lecture Notes in Computer Science;Z Brakerski,2019
4. Canetti, R., Feige, U., Goldreich, O., Naor, M.: Adaptively secure multi-party computation. In: Proceedings of the Twenty-eighth Annual ACM Symposium on Theory of Computing, pp. 639–648. STOC 1996. ACM, New York (1996). http://doi.acm.org/10.1145/237814.238015
5. Canetti, R., Lindell, Y., Ostrovsky, R., Sahai, A.: Universally composable two-party and multi-party secure computation. In: Proceedings of the Thiry-Fourth Annual ACM Symposium on Theory of Computing, pp. 494–503. STOC 202, Association for Computing Machinery, New York (2002). https://doi.org/10.1145/509907.509980
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献