Introduction to Secure Computation
- 1 January 1999
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 49 references indexed in Scilit:
- Efficient Byzantine agreement secure against general adversariesPublished by Springer Nature ,1998
- Comparing information without leaking itCommunications of the ACM, 1996
- A Secure Protocol for the Oblivious Transfer (Extended Abstract)Journal of Cryptology, 1996
- Oblivious transfers and intersecting codesIEEE Transactions on Information Theory, 1996
- Robust sharing of secrets when the dealer is honest or cheatingJournal of the ACM, 1994
- Threshold cryptographyEuropean Transactions on Telecommunications, 1994
- Achieving Electronic PrivacyScientific American, 1992
- Conjugate codingACM SIGACT News, 1983
- How to share a secretCommunications of the ACM, 1979
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978