Fast Cut-and-Choose-Based Protocols for Malicious and Covert Adversaries
Crossref DOI link: https://doi.org/10.1007/s00145-015-9198-0
Published Online: 2015-02-28
Published Print: 2016-04
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Lindell, Yehuda
Text and Data Mining valid from 2015-02-28
Article History
Received: 23 December 2013
First Online: 28 February 2015
Free to read: This content has been made available to all.