Adaptive versus Non-Adaptive Security of Multi-Party Protocols.Published in:Journal of Cryptology, 2004, v. 17, n. 3, p. 153, doi. 10.1007/s00145-004-0135-xBy:Canetti, Ran;Damgård, Ivan;Dziembowski, Stefan;Ishai, Yuval;Malkin, TalPublication type:Article
Nearly One-Sided Tests and the Goldreich–Levin Predicate.Published in:Journal of Cryptology, 2004, v. 17, n. 3, p. 209, doi. 10.1007/s00145-003-0141-4By:Hast, GustavPublication type:Article