Author:
Beaver D.,Feigenbaum J.,Kilian J.,Rogaway P.
Publisher
Springer Berlin Heidelberg
Reference36 articles.
1. M. Abadi, J. Feigenbaum, and J. Kilian. On Hiding Information from an Oracle, J. Comput. System Sci. 39 (1989), 21–50.
2. L. Babai, L. Fortnow, and C. Lund. Non-Deterministic Exponential Time has Two-Prover Interactive Proofs, Proc. of FOCS 1990, IEEE.
3. J. Bar-Ilan and D. Beaver. Non-Cryptographic Fault-Tolerant Computing in a Constant Number of Rounds, Proc. of PODC 1989, ACM, 201–209.
4. Lect Notes Comput Sci;D. Beaver,1990
5. D. Beaver. Perfect Privacy for Two-Party Protocols, Proc. of DIMACS Workshop on Distributed Computing and Cryptography (Princeton, NJ; October, 1989), AMS, 1990.
Cited by
32 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献