Author:
Khurana Dakshita,Maji Hemanta K.,Sahai Amit
Publisher
Springer Berlin Heidelberg
Reference57 articles.
1. Arikan, E.: Channel polarization: a method for constructing capacity-achieving codes. In: Kschischang, F.R., Yang, E. (eds.) 2008 IEEE International Symposium on Information Theory, ISIT 2008, Toronto, ON, Canada, 6–11 July 2008, pp. 1173–1177. IEEE (2008).
http://dx.doi.org/10.1109/ISIT.2008.4595172
2. Arikan, E.: Channel polarization: a method for constructing capacity-achieving codes for symmetric binary-input memoryless channels. IEEE Trans. Inf. Theor. 55(7), 3051–3073 (2009).
http://dx.doi.org/10.1109/TIT.2009.2021379
3. Beaver, D.: Perfect privacy for two-party protocols. In: Feigenbaum, J., Merritt, M. (eds.) Proceedings of DIMACS Workshop on Distributed Computing and Cryptography, vol. 2, pp. 65–77. American Mathematical Society (1989)
4. Lecture Notes in Computer Science;A Beimel,1999
5. Ben-David, A., Nisan, N., Pinkas, B.: FairplayMP: a system for secure multi-party computation. In: Ning, P., Syverson, P.F., Jha, S. (eds.) ACM 15th Conference on Computer and Communications Security, CCS 2008, pp. 257–266. ACM Press, Alexandria (27–31 October 2008)
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献