Author of the publication

Cryptographic Protocols Provably Secure Against Dynamic Adversaries.

, and . EUROCRYPT, volume 658 of Lecture Notes in Computer Science, page 307-323. Springer, (1992)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dapper, a Large-Scale Distributed Systems Tracing Infrastructure, , , , , , , and . Google, Inc., (2010)Commodity-Based Cryptography (Extended Abstract).. STOC, page 446-455. ACM, (1997)Cryptographic Protocols Provably Secure Against Dynamic Adversaries., and . EUROCRYPT, volume 658 of Lecture Notes in Computer Science, page 307-323. Springer, (1992)One-Time Tables for Two-Party Computation.. COCOON, volume 1449 of Lecture Notes in Computer Science, page 361-370. Springer, (1998)Precomputing Oblivious Transfer.. CRYPTO, volume 963 of Lecture Notes in Computer Science, page 97-109. Springer, (1995)Server-Assisted Cryptography.. Workshop on New Security Paradigms, page 92-106. ACM, (1998)Software Integrity and Validation Using Cryptographic Composability and Computer Vision.. CSCML, volume 12716 of Lecture Notes in Computer Science, page 405-413. Springer, (2021)Multiparty Computation with Faulty Majority (Extended Announcement), and . FOCS, page 468-473. IEEE Computer Society, (1989)On the Isolation of a Common Secret., , and . The Mathematics of Paul Erdős II, Springer, (2013)The Round Complexity of Secure Protocols (Extended Abstract), , and . STOC, page 503-513. ACM, (1990)