Author:
Alon Bar,Nissenbaum Olga,Omri Eran,Paskin-Cherniavsky Anat,Patra Arpita
Publisher
Springer Nature Switzerland
Reference11 articles.
1. Lecture Notes in Computer Science;B Alon,2019
2. Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computing. In: Proceedings of the 20th STOC, pp. 1–10 (1988). https://doi.org/10.1145/3335741.3335756
3. Brassard, G., Crépeau, C., Santha, M.: Oblivious transfers and intersecting codes. IACR Cryptology ePrint Archive, vol. 1996, p. 10 (1996). http://eprint.iacr.org/1996/010
4. Canetti, R.: Security and composition of multiparty cryptographic protocols. J. Cryptol. 13(1), 143–202 (2000). https://doi.org/10.1007/s001459910006
5. Chaum, D., Crépeau, C., Damgard, I.: Multiparty unconditionally secure protocols. In: Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, pp. 11–19 (1988). https://doi.org/10.1145/62212.62214