Crossref Citations
This Book has been
cited by the following publications. This list is generated based on data provided by Crossref.
Harel, David
and
Feldman, Yishai
1987.
Algorithmics.
p.
359.
Bellare, Mihir
Boldyreva, Alexandra
Desai, Anand
and
Pointcheval, David
2001.
Advances in Cryptology — ASIACRYPT 2001.
Vol. 2248,
Issue. ,
p.
566.
Canetti, R.
2001.
Universally composable security: a new paradigm for cryptographic protocols.
p.
136.
Lindell, Yehuda
2001.
Advances in Cryptology — CRYPTO 2001.
Vol. 2139,
Issue. ,
p.
171.
Barak, B.
2001.
How to go beyond the black-box simulation barrier.
p.
106.
Canetti, Ran
and
Krawczyk, Hugo
2002.
Advances in Cryptology — CRYPTO 2002.
Vol. 2442,
Issue. ,
p.
143.
Nielsen, Jesper Buus
2002.
Advances in Cryptology — CRYPTO 2002.
Vol. 2442,
Issue. ,
p.
401.
Wang, Yan
Lü, Shuwang
and
Liu, Zhenhua
2002.
Advanced Communications and Multimedia Security.
Vol. 100,
Issue. ,
p.
29.
Müller, Olaf
and
Nüsken, Michael
2002.
Progress in Cryptology — INDOCRYPT 2002.
Vol. 2551,
Issue. ,
p.
79.
Koshiba, Takeshi
2002.
Public Key Cryptography.
Vol. 2274,
Issue. ,
p.
34.
Naor, Moni
Reingold, Omer
and
Rosen, Alon
2002.
Pseudorandom Functions and Factoring.
SIAM Journal on Computing,
Vol. 31,
Issue. 5,
p.
1383.
Kursawe, K.
2002.
Asynchronous Byzantine group communication.
p.
352.
Canetti, Ran
and
Krawczyk, Hugo
2002.
Advances in Cryptology — EUROCRYPT 2002.
Vol. 2332,
Issue. ,
p.
337.
Lipton, R.J.
Rajagopalan, S.
and
Serpanos, D.N.
2002.
Spy: a method to secure clients for network services.
p.
23.
Prabhakaran, M.
Rosen, A.
and
Sahai, A.
2002.
Concurrent zero knowledge with logarithmic round-complexity.
p.
366.
Backes, Michael
and
Pfitzmann, Birgit
2002.
Computer Security — ESORICS 2002.
Vol. 2502,
Issue. ,
p.
1.
Canetti, Ran
Kilian, Joe
Petrank, Erez
and
Rosen, Alon
2002.
Black-Box Concurrent Zero-Knowledge Requires (Almost) Logarithmically Many Rounds.
SIAM Journal on Computing,
Vol. 32,
Issue. 1,
p.
1.
Dyer, Martin
Goldberg, Leslie A.
and
Jerrum, Mark
2002.
Randomization and Approximation Techniques in Computer Science.
Vol. 2483,
Issue. ,
p.
51.
Barak, B.
2002.
Constant-round coin-tossing with a man in the middle or realizing the shared random string model.
p.
345.
Micciancio, Daniele
and
Petrank, Erez
2003.
Advances in Cryptology — EUROCRYPT 2003.
Vol. 2656,
Issue. ,
p.
140.