

Author: Lindell Yehuda
Publisher: Springer Publishing Company
ISSN: 0933-2790
Source: Journal of Cryptology, Vol.22, Iss.3, 2009-07, pp. : 395-428
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content


Long-Term Security and Universal Composability
Journal of Cryptology, Vol. 23, Iss. 4, 2010-10 ,pp. :




Completeness in Two-Party Secure Computation: A Computational View
By Harnik Danny
Journal of Cryptology, Vol. 19, Iss. 4, 2006-10 ,pp. :

