General secure multiparty computation - Preface

被引:3
作者
Goldreich, O [1 ]
机构
[1] Weizmann Inst Sci, Dept Comp Sci & Appl Math, IL-76100 Rehovot, Israel
关键词
All Open Access; Bronze;
D O I
10.1007/s001459910001
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cryptography
引用
收藏
页码:1 / 7
页数:7
相关论文
共 24 条
[1]  
BEAVER D, 1990, PROCEEDINGS OF THE TWENTY SECOND ANNUAL ACM SYMPOSIUM ON THEORY OF COMPUTING, P503, DOI 10.1145/100216.100287
[2]  
Beaver D., 1991, Journal of Cryptology, V4, P75, DOI 10.1007/BF00196771
[3]  
BEAVER D, 1991, LECT NOTES COMPUTER, V576, P377
[4]  
Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
[5]  
Canetti R., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P639, DOI 10.1145/237814.238015
[6]  
CANETTI R, 1994, LECT NOTES COMPUTER, V839, P425
[7]  
Chaum D., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P11, DOI 10.1145/62212.62214
[8]   A ZERO-ONE LAW FOR BOOLEAN PRIVACY [J].
CHOR, B ;
KUSHILEVITZ, E .
SIAM JOURNAL ON DISCRETE MATHEMATICS, 1991, 4 (01) :36-47
[9]  
Chor B., 1985, P 26 IEEE S FDN COMP, P383
[10]  
DESMEDT Y, 1989, LECT NOTES COMPUTER, V435, P307