Author:
Ishai Yuval,Khurana Dakshita,Sahai Amit,Srinivasan Akshayaram
Publisher
Springer Nature Switzerland
Reference27 articles.
1. Applebaum, B., Ishai, Y., Kushilevitz, E.: Cryptography in NC$$^0$$. In: 45th FOCS, pp. 166–175. IEEE Computer Society Press, October 2004
2. Lecture Notes in Computer Science;P Ananth,2020
3. Lecture Notes in Computer Science;P Ananth,2021
4. Lecture Notes in Computer Science;A Afshar,2014
5. Abascal, J., Sereshgi, M.H.F., Hazay, C., Ishai, Y., Venkitasubramaniam, M.: Is the classical GMW paradigm practical? The case of non-interactive actively secure 2PC. In: Ligatti, J., Ou, X., Katz, J., Vigna, G. (eds.) CCS ’20: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pp. 1591–1605. ACM (2020)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献