Adaptive versus non-adaptive security of multi-party protocols

Ran Canetti*, Ivan Damgård, Stefan Dziembowski, Yuval Ishai, Tal Malkin

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

30 Scopus citations

Fingerprint

Dive into the research topics of 'Adaptive versus non-adaptive security of multi-party protocols'. Together they form a unique fingerprint.

Keyphrases

Computer Science