Author:
Crépeau Claude,Kazmi Raza Ali
Publisher
Springer Berlin Heidelberg
Reference35 articles.
1. Rabin, M.O.: How to exchange secrets by oblivious transfer. Technical Memo TR81, Aiken Computation Laboratory, Harvard University (1981)
2. Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. Commun. ACM 28(6), 637–647 (1985)
3. Fischer, M.J., Micali, S., Rackoff, C.: A secure protocol for the oblivious transfer. J. Cryptol. 9(3), 191–195 (1996)
4. Lecture Notes in Computer Science;R Berger,1985
5. Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484–1509 (1997)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献