Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications,Software
Reference36 articles.
1. B. Barak, How to go beyond the black-box simulation barrier, in 42nd FOCS, pp. 106–115, 2001
2. LNCS;D. Beaver,1991
3. R. Canetti, Security and composition of multiparty cryptographic protocols, Theory of Cryptography Library, Record 98-18, version of June 4th, 1998 (later versions do not contain the referenced material)
4. R. Canetti, Security and composition of multiparty cryptographic protocols, J. Cryptol. 13(1), 143–202 (2000)
5. R. Canetti, Universally composable security: a new paradigm for cryptographic protocols, in 42nd FOCS, pp. 136–145, 2001
Cited by
23 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献