Skip to main navigation
Skip to search
Skip to main content
Tel Aviv University Home
Update Request & User Guide (TAU staff only)
Home
Experts
Research units
Research output
Datasets
Prizes
Activities
Press/Media
Search by expertise, name or affiliation
Security and composition of multiparty cryptographic protocols
Ran Canetti
*
*
Corresponding author for this work
IBM
Research output
:
Contribution to journal
›
Article
›
peer-review
953
Scopus citations
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'Security and composition of multiparty cryptographic protocols'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Keyphrases
Computational Model
100%
Cryptographic Protocols
100%
Composition Operation
100%
Non-adaptive
50%
Information Theory
50%
Multi-party Protocol
50%
Secure Protocol
50%
Byzantine Adversary
50%
Adaptive Adversary
50%
Probabilistic Function
50%
Computer Science
Computational Modeling
100%
Cryptographic Protocol
100%
Composition Operation
100%