scientific article; zbMATH DE number 503347
From MaRDI portal
Publication:4279686
zbMATH Open0801.68048MaRDI QIDQ4279686FDOQ4279686
Authors: Stuart Haber, Donald Beaver
Publication date: 29 November 1994
Title of this publication is not available (Why is that?)
Recommendations
Cited In (23)
- Adaptively secure distributed public-key systems.
- Quantifying quantum correlations in noisy Gaussian channels
- OAEP Is Secure under Key-Dependent Messages
- Feasibility and infeasibility of adaptively secure fully homomorphic encryption
- Practical design of two-party cryptographic protocols
- Title not available (Why is that?)
- Title not available (Why is that?)
- Virtual smart cards: how to sign with a password and a server
- Optimal resilient threshold GQ signatures
- On expected constant-round protocols for Byzantine agreement
- The reactive simulatability (RSIM) framework for asynchronous systems
- Simple, Black-Box Constructions of Adaptively Secure Protocols
- Adaptively Secure Two-Party Computation with Erasures
- SoK: public key encryption with openings
- Adaptively secure MPC with sublinear communication complexity
- On Adaptively Secure Multiparty Computation with a Short CRS
- Efficient, adaptively secure, and composable oblivious transfer with a single, global CRS
- How to simulate it -- a tutorial on the simulation proof technique
- Non-committing encryption with constant ciphertext expansion from standard assumptions
- Adaptive security of multi-party protocols, revisited
- Reducibility among protocols. (Extended abstract)
- Efficient one-sided adaptively secure computation
- Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4279686)