메뉴 건너뛰기




Volumn , Issue , 2005, Pages 513-522

Covert two-party computation

Author keywords

Covert Computation; Fair two party computation; Steganography; Two Party Computation

Indexed keywords

COVERT COMPUTATION; FAIR TWO-PARTY COMPUTATION; STEGANOGRAPHY; TWO-PARTY COMPUTATION;

EID: 34848898460     PISSN: 07378017     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1060590.1060668     Document Type: Conference Paper
Times cited : (31)

References (23)
  • 4
  • 11
    • 84976655650 scopus 로고
    • Cryptographic computation: Secure fault-tolerant protocols and the public-key model
    • Z. Calil, S. Haber, M. Yung. Cryptographic Computation: Secure Fault-Tolerant Protocols and the Public-Key Model. Advances in Cryptology -Proceedings of CRYPTO '87, pages 135-155, 1987.
    • (1987) Advances in Cryptology -Proceedings of CRYPTO '87 , pp. 135-155
    • Calil, Z.1    Haber, S.2    Yung, M.3
  • 18
    • 0001448484 scopus 로고
    • Bit commitment using pseudorandomness
    • M. Naor. Bit Commitment Using Pseudorandomness. J. Cryptology 4(2): 151-158 (1991)
    • (1991) J. Cryptology , vol.4 , Issue.2 , pp. 151-158
    • Naor, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.