On the round complexity of covert computation
From MaRDI portal
Publication:2875145
Recommendations
Cited in
(8)- On the universal steganography of optimal rate
- Short concurrent covert authenticated key exchange (short cAKE)
- Security levels in steganography -- insecurity does not imply detectability
- Efficient covert two-party computation
- The Exact Round Complexity of Secure Computation
- Practical covert authentication
- On non-black-box simulation and the impossibility of approximate obfuscation
- Covert authentication from lattices
This page was built for publication: On the round complexity of covert computation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2875145)