×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [idealmodel adversary]
Survey: Secure Composition of Multiparty Protocols Yehuda Lindell IBM T.J. Watson
213 views
Impossibility Results for Concurrent Two-Party Computation
26 views
Universally Composable computation with any number of faults Ran Canetti IBM Research Joint works with Marc Fischlin, Yehuda Lindell, Rafi Ostrovsky, Tal
221 views
Survey: Secure Composition of Multiparty Protocols
34 views
Secure Multiparty Computation
74 views
Information-Theoretic Security and Security under Composition Eyal Kushilevitz (Technion) Yehuda Lindell (Bar-Ilan University) Tal Rabin (IBM T.J. Watson)
215 views