Cryptographic Computation: Secure Fault-Tolerant Protocols and the Public-Key Model (Extended Abstract)
- 1 January 1988
- book chapter
- Published by Springer Nature in Lecture Notes in Computer Science
- p. 135-155
- https://doi.org/10.1007/3-540-48184-2_10
Abstract
No abstract availableKeywords
This publication has 34 references indexed in Scilit:
- An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial InformationPublished by Springer Nature ,2000
- A simple protocol for secure circuit evaluationPublished by Springer Nature ,1988
- A randomized protocol for signing contractsCommunications of the ACM, 1985
- A fair protocol for signing contractsPublished by Springer Nature ,1985
- How to exchange (secret) keysACM Transactions on Computer Systems, 1983
- Comparison of Two Pseudo-Random Number GeneratorsPublished by Springer Nature ,1983
- How to share a secretCommunications of the ACM, 1979
- Relations Among Complexity MeasuresJournal of the ACM, 1979
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976