Author of the publication

On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions.

, , and . EUROCRYPT, volume 1592 of Lecture Notes in Computer Science, page 56-73. Springer, (1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Primality Testing Using Elliptic Curves., and . J. ACM, 46 (4): 450-472 (1999)On the Power of Sigmoid Neural Networks., and . COLT, page 137-143. ACM, (1993)Weakening Security Assumptions and Oblivious Transfer (Abstract)., and . CRYPTO, volume 403 of Lecture Notes in Computer Science, page 2-7. Springer, (1988)On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions., , and . EUROCRYPT, volume 1592 of Lecture Notes in Computer Science, page 56-73. Springer, (1999)On the Concurrent Composition of Zero-Knowledge Proofs., and . EUROCRYPT, volume 1592 of Lecture Notes in Computer Science, page 415-431. Springer, (1999)Extending Oblivious Transfers Efficiently., , , and . CRYPTO, volume 2729 of Lecture Notes in Computer Science, page 145-161. Springer, (2003)A Linked-List Approach to Cryptographically Secure Elections Using Instant Runoff Voting., and . ASIACRYPT, volume 5350 of Lecture Notes in Computer Science, page 198-215. Springer, (2008)Asymptotic distribution for the birthday problem with multiple coincidences, via an embedding of the collision process., , and . Random Struct. Algorithms, 48 (3): 480-502 (2016)The Dynamic Universality of Sigmoidal Neural Networks., and . Inf. Comput., 128 (1): 48-56 (1996)Efficient Identification Schemes Using Two Prover Interactive Proofs., , , and . CRYPTO, volume 435 of Lecture Notes in Computer Science, page 498-506. Springer, (1989)