-
1
-
-
38049082907
-
Security against covert adversaries: Efficient protocols for realistic adversaries
-
Vadhan, S.P. (ed.) LNCS Springer, Heidelberg
-
Aumann, Y., Lindell, Y.: Security against covert adversaries: Efficient protocols for realistic adversaries. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 137-156. Springer, Heidelberg (2007)
-
(2007)
TCC 2007
, vol.4392
, pp. 137-156
-
-
Aumann, Y.1
Lindell, Y.2
-
2
-
-
70350653341
-
-
(unpublished manuscript)
-
Averbuch, B., Blum, M., Chor, B., Goldwasser, S., Micali, S.: How to implement Bracha's O(log n) Byzantine agreement algorithm (1985) (unpublished manuscript)
-
(1985)
How to Implement Bracha's O(log N) Byzantine Agreement Algorithm
-
-
Averbuch, B.1
Blum, M.2
Chor, B.3
Goldwasser, S.4
Micali, S.5
-
3
-
-
17744380057
-
Coin flipping by telephone a protocol for solving impossible problems
-
Blum, M.: Coin flipping by telephone a protocol for solving impossible problems. SIGACT News 15(1), 23-27 (1983)
-
(1983)
SIGACT News
, vol.15
, Issue.1
, pp. 23-27
-
-
Blum, M.1
-
4
-
-
0021522644
-
How to generate cryptographically strong sequences of pseudo-random bits
-
Blum, M., Micali, S.: How to generate cryptographically strong sequences of pseudo-random bits. SIAM J. on Computing 13, 850-864 (1984)
-
(1984)
SIAM J. on Computing
, vol.13
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
5
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
Canetti, R.: Security and composition of multiparty cryptographic protocols. J. of Cryptology 13(1), 143-202 (2000)
-
(2000)
J. of Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
6
-
-
0012610677
-
Limits on the security of coin flips when half the processors are faulty
-
Cleve, R.: Limits on the security of coin flips when half the processors are faulty. In: Proc. of the 18th STOC, pp. 364-369 (1986)
-
(1986)
Proc. of the 18th STOC
, pp. 364-369
-
-
Cleve, R.1
-
10
-
-
35448952561
-
On achieving the "best of both worlds" in secure multiparty computation
-
ACM Press, New York
-
Katz, J.: On achieving the "best of both worlds" in secure multiparty computation. In: Proc. of the 39th STOC, pp. 11-20. ACM Press, New York (2007)
-
(2007)
Proc. of the 39th STOC
, pp. 11-20
-
-
Katz, J.1
-
11
-
-
4544235438
-
Parallel coin-tossing and constant-round secure two-party computation
-
Lindell, Y.: Parallel coin-tossing and constant-round secure two-party computation. J. of Cryptology 16(3), 143-184 (2003)
-
(2003)
J. of Cryptology
, vol.16
, Issue.3
, pp. 143-184
-
-
Lindell, Y.1
-
12
-
-
70350649064
-
An optimally fair coin toss
-
Reingold, O. (ed.) LNCS Springer, Heidelberg
-
Moran, T., Naor, M., Segev, G.: An optimally fair coin toss. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 1-18. Springer, Heidelberg (2009)
-
(2009)
TCC 2009
, vol.5444
, pp. 1-18
-
-
Moran, T.1
Naor, M.2
Segev, G.3
-
13
-
-
4544250511
-
Bounded-concurrent secure multi-party computation with a dishonest majority
-
Pass, R.: Bounded-concurrent secure multi-party computation with a dishonest majority. In: Proc. of the 36th STOC, pp. 232-241 (2004)
-
(2004)
Proc. of the 36th STOC
, pp. 232-241
-
-
Pass, R.1
-
14
-
-
0024859552
-
Verifiable secret sharing and multiparty protocols with honest majority
-
Rabin, T., Ben-Or, M.: Verifiable secret sharing and multiparty protocols with honest majority. In: Proc. of the 21st STOC, pp. 73-85 (1989)
-
(1989)
Proc. of the 21st STOC
, pp. 73-85
-
-
Rabin, T.1
Ben-Or, M.2
|