×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
The top documents tagged [idealmodel adversary]
Documents
Survey: Secure Composition of Multiparty Protocols Yehuda Lindell IBM T.J. Watson
216 views
Documents
Information-Theoretic Security and Security under Composition Eyal Kushilevitz (Technion) Yehuda Lindell (Bar-Ilan University) Tal Rabin (IBM T.J. Watson)
215 views
Documents
Impossibility Results for Concurrent Two-Party Computation
26 views
Documents
Universally Composable computation with any number of faults Ran Canetti IBM Research Joint works with Marc Fischlin, Yehuda Lindell, Rafi Ostrovsky, Tal
225 views
Documents
Survey: Secure Composition of Multiparty Protocols
43 views
Documents
Secure Multiparty Computation
83 views