Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications
Reference29 articles.
1. Aggarwal D., Damgård I., Nielsen J.B., Obremski M., Purwanto E., Ribeiro J., Simkin M.: Stronger leakage-resilient and non-malleable secret sharing schemes for general access structures. In: Advances in Cryptology—CRYPTO 2019. Lect. Notes Comput. Sci., vol. 11693, pp. 510–539 (2019).
2. Albab K.D., Issa R., Varia M., Graffi K.: Batched differentially private information retrieval. In: 31st USENIX Security Symposium (USENIX Security 22), pp. 3327–3344 (2022).
3. Badrinarayanan S., Srinivasan A.: Revisiting non-malleable secret sharing. In: Advances in Cryptology—EUROCRYPT 2019. Lect. Notes Comput. Sci., vol. 11476, pp. 593–622 (2019).
4. Bentov I., Kumaresan R.: How to use bitcoin to design fair protocols. In: Advances in Cryptology—CRYPTO 2014. Lect. Notes Comput. Sci., vol. 8617, pp. 421–439 (2014).
5. Blakley G. R.: Safeguarding cryptographic keys. In: International Workshop on Managing Requirements Knowledge, pp. 313–318 (1979)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献