Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications,Software
Reference36 articles.
1. B. Barak, How to play almost any mental game over the net - Concurrent composition via super-polynomial simulation, in 46th FOCS (IEEE Computer Society Press, October 2005), pp. 543–552
2. R. Canetti, Universally composable security: A new paradigm for cryptographic protocols, in 42nd FOCS (IEEE Computer Society Press, October 2001), pp. 136–145
3. S.G. Choi, D. Dachman-Soled, T. Malkin, Hoeteck Wee, Black-box construction of a non-malleable encryption scheme from any semantically secure one, in R. Canetti, editor, TCC 2008, vol. 4948 of LNCS (Springer, Heidelberg, March 2008), pp. 427–444
4. S.G. Choi, D. Dachman-Soled, T. Malkin, H. Wee, Simple, black-box constructions of adaptively secure protocols, in O. Reingold, editor, TCC 2009, vol. 5444 of LNCS (Springer, Heidelberg, March 2009), pp. 387–402
5. S.G. Choi, D. Dachman-Soled, T. Malkin, H. Wee, A black-box construction of non-malleable encryption from semantically secure encryption. J. Cryptol. (2017)