Author:
Canetti Ran,Damgaard Ivan,Dziembowski Stefan,Ishai Yuval,Malkin Tal
Publisher
Springer Berlin Heidelberg
Reference23 articles.
1. B91._D. Beaver, “Secure Multi-party Protocols and Zero-Knowledge Proof Systems Tolerating a Faulty Minority”, J. Cryptology, Springer-Verlag, (1991) 4: 75–122.
2. B97._D. Beaver, “Plug and Play Encryption”, CRYPTO 97.
3. BH92._D. Beaver and S. Haber, “Cryptographic Protocols Provably secure Against Dynamic Adversaries”, Eurocrypt, 1992.
4. BGW88._M. Ben-Or, S. Goldwasser and A. Wigderson, “Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation”, 20th Symposium on Theory of Computing (STOC), ACM, 1988, pp. 1–10.
5. C00._R. Canetti, “Security and Composition of Multiparty Cryptographic Protocols”, Journal of Cryptology, Vol. 13, No. 1, Winter 2000. On-line version at http://philby.ucsd.edu/cryptolib/1998/98-18.html .
Cited by
16 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献