Author:
Lindell Yehuda,Pinkas Benny
Publisher
Springer Berlin Heidelberg
Reference21 articles.
1. M. Bellare and S. Micali, Non-interactive oblivious transfer and applications, Advances in Cryptology-Cryptord’ 89, pp. 547–557, 1990.
2. M. Ben-Or, S. Goldwasser and A. Wigderson, Completeness theorems for non cryptographic fault tolerant distributed computation, 20th STOC, (1988), 1–9.
3. Lect Notes Comput Sci;D. Boneh,1997
4. R. Canetti, Security and Composition of Multi-party Cryptographic Protocols. To appear in the Journal of Cryptology. Available from the Theory of Cryptography Library at http://philby.ucsd.edu/cryptlib , 1998.
5. D. Chaum, C. Crepeau and I. Damgard, Multiparty unconditionally secure protocols, 20th Proc. ACM Symp. on Theory of Computing, (1988), 11–19.
Cited by
328 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献