Author:
Frankel Yair,MacKenzie Philip,Yung Moti
Subject
General Computer Science,Theoretical Computer Science
Reference43 articles.
1. Improved digital signature scheme based on discrete exponentiation;Agnew;Electron. Lett.,1990
2. E. Bach, Discrete logarithms and factoring, Technical report, Computer Science Division (EECS), University of California Press, Berkeley, CA, June 1984.
3. D. Beaver, Adaptively secure oblivious transfer, in: Advances in Cryptology—ASIACRYPT ’98, Lecture Notes in Computer Science, Springer, Berlin, November 1998, pp. 300–314.
4. D. Beaver, S. Haber, Cryptographic protocols provably secure against dynamic adversaries, in: Advances in Cryptology—EUROCRYPT 92, Lecture Notes in Computer Science, Vol. 658, Springer, Berlin, 24–28 May 1992, pp. 307–323.
5. R. Canetti, U. Feige, O. Goldreich, M. Naor, Adaptively secure multi-party computation, in: STOC’96, Proc. 28th Annu. ACM Symp. on the Theory of Computing, Philadelphia, PA, 22–24 May 1996, pp. 639–648.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献