Academic literature on the topic 'Adaptively-secure multiparty computation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Adaptively-secure multiparty computation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Adaptively-secure multiparty computation"
Cramer, Ronald, Ivan B. Damgård, Stefan Dziembowski, Martin Hirt, and Tal Rabin. "Efficient Multiparty Computations with Dishonest Minority." BRICS Report Series 5, no. 36 (June 6, 1998). http://dx.doi.org/10.7146/brics.v5i36.19441.
Full textCanetti, Ran, Oxana Poburinnaya, and Muthuramakrishnan Venkitasubramaniam. "Equivocating Yao: Constant-Round Adaptively Secure Multiparty Computation in the Plain Model." SIAM Journal on Computing, January 13, 2022, STOC17–333—STOC17–399. http://dx.doi.org/10.1137/17m1151602.
Full textDissertations / Theses on the topic "Adaptively-secure multiparty computation"
Poburinnaya, Oxana. "Studies in incoercible and adaptively secure computation." Thesis, 2019. https://hdl.handle.net/2144/41669.
Full textSarkar, Pratik. "Adaptively Secure Primitives in the Random Oracle Model." Thesis, 2018. https://etd.iisc.ac.in/handle/2005/5449.
Full textBook chapters on the topic "Adaptively-secure multiparty computation"
Cohen, Ran, and Chris Peikert. "On Adaptively Secure Multiparty Computation with a Short CRS." In Lecture Notes in Computer Science, 129–46. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-44618-9_7.
Full textDachman-Soled, Dana, Jonathan Katz, and Vanishree Rao. "Adaptively Secure, Universally Composable, Multiparty Computation in Constant Rounds." In Theory of Cryptography, 586–613. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-46497-7_23.
Full textBenhamouda, Fabrice, Huijia Lin, Antigoni Polychroniadou, and Muthuramakrishnan Venkitasubramaniam. "Two-Round Adaptively Secure Multiparty Computation from Standard Assumptions." In Theory of Cryptography, 175–205. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-03807-6_7.
Full text