Publisher
Springer Berlin Heidelberg
Reference26 articles.
1. D. Beaver, “Precomputing oblivious transfer,” in Advances in Cryptology: CRYPTO '95 (D. Coppersmith, ed.), vol. 963 of Lecture Notes in Computer Science, Springer, 1995.
2. C. H. Bennett, G. Brassard, C. Crépeau, and U. M. Maurer, “Generalized privacy amplification,” IEEE Transactions on Information Theory, vol. 41, pp. 1915–1923,Nov. 1995.
3. C. H. Bennett, G. Brassard, and J.-M. Robert, “How to reduce your enemy's information,” in Advances in Cryptology: CRYPTO '85 (H. C. Williams, ed.), vol. 218 of Lecture Notes in Computer Science, pp. 468–476, Springer, 1986.
4. G. Brassard and C. Crépeau, “Oblivious transfers and privacy amplification,” in Advances in Cryptology: EUROCRYPT '97 (W. Fumy, ed.), vol. 1233 of Lecture Notes in Computer Science, pp. 334–347, Springer, 1997.
5. G. Brassard, C. Crépeau, and J.-M. Robert, “Information theoretic reductions among disclosure problems,” in Proc. 27th IEEE Symposium on Foundations of Computer Science (FOCS), 1986.
Cited by
30 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献