Cited By
View all- Boyle EGoldwasser STessaro S(2013)Communication locality in secure multi-party computationProceedings of the 10th theory of cryptography conference on Theory of Cryptography10.1007/978-3-642-36594-2_21(356-376)Online publication date: 3-Mar-2013
- Jetchev DÖzen OStam M(2012)Understanding adaptivityProceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security10.1007/978-3-642-34961-4_20(313-330)Online publication date: 2-Dec-2012
- Lampe RPatarin JSeurin Y(2012)An asymptotically tight security analysis of the iterated even-mansour cipherProceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security10.1007/978-3-642-34961-4_18(278-295)Online publication date: 2-Dec-2012
- Show More Cited By