×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [real adversary]
Security Analysis of Network Protocols: Logical and Computational Methods John Mitchell Stanford University Logic and Computational Complexity, 2006
219 views
1 Introduction to Secure Computation Benny Pinkas HP Labs, Princeton
224 views
Survey: Secure Composition of Multiparty Protocols Yehuda Lindell IBM T.J. Watson
213 views
The Ruins of a Myth or a Myth in Ruins? Paul Blokker University of Trento
37 views
Secure Multiparty Computation
74 views
Information-Theoretic Security and Security under Composition Eyal Kushilevitz (Technion) Yehuda Lindell (Bar-Ilan University) Tal Rabin (IBM T.J. Watson)
216 views