Author:
Liu-Zhang Chen-Da,Loss Julian,Maurer Ueli,Moran Tal,Tschudi Daniel
Publisher
Springer International Publishing
Reference45 articles.
1. Lecture Notes in Computer Science;G Asharov,2012
2. Beaver, D., Micali, S., Rogaway, P.: The round complexity of secure protocols (extended abstract). In: 22nd ACM STOC, pp. 503–513. ACM Press, May 1990
3. Beerliova-Trubiniova, Z., Hirt, M., Buus Nielsen, J.: Almost-asynchronous MPC with faulty minority. Cryptology ePrint Archive, Report 2008/416 (2008). http://eprint.iacr.org/2008/416
4. Beerliová-Trubíniová, Z., Hirt, M., Buus Nielsen, J.: On the theoretical gap between synchronous and asynchronous MPC protocols. In: PODC, Zurich, Switzerland (2010)
5. Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation (extended abstract). In: 20th ACM STOC, pp. 1–10. ACM Press, May 1988
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献