Found: 3
Select item for more details and to access through your institution.
On the Limitations of Universally Composable Two-Party Computation Without Set-Up Assumptions.
- Published in:
- Journal of Cryptology, 2006, v. 19, n. 2, p. 135, doi. 10.1007/s00145-005-0419-9
- By:
- Publication type:
- Article
Strengthening Zero-Knowledge Protocols Using Signatures.
- Published in:
- Journal of Cryptology, 2006, v. 19, n. 2, p. 169, doi. 10.1007/s00145-005-0307-3
- By:
- Publication type:
- Article
An Improved Real-Quadratic-Field-Based Key Exchange Procedure.
- Published in:
- Journal of Cryptology, 2006, v. 19, n. 2, p. 211, doi. 10.1007/s00145-005-0357-6
- By:
- Publication type:
- Article