Author:
Kolesnikov Vladimir,Sadeghi Ahmad-Reza,Schneider Thomas
Publisher
Springer Berlin Heidelberg
Reference46 articles.
1. Ahn, L.v., Hopper, N.J., Langford, J.: Covert two-party computation. In: ACM Symposium on Theory of Computing (STOC 2005), pp. 513–522. ACM, New York (2005)
2. Lecture Notes in Computer Science;W. Aiello,2001
3. Armknecht, F., Sadeghi, A.-R.: A new approach for algebraically homomorphic encryption. Cryptology ePrint Archive, Report 2008/422 (2008)
4. Lecture Notes in Computer Science;M. Barni,2009
5. Lecture Notes in Computer Science;D. Beaver,1995
Cited by
151 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献