The following publications are possibly variants of this publication:
- Universally Composable Secure Two and Multi-party Computation in the Corruptible Tamper-Proof Hardware Token ModelNishanth Chandran, Wutichai Chongchitmate, Rafail Ostrovsky, Ivan Visconti. iacr, 2017:1092, 2017. [doi]
- Universally Composable Almost-Everywhere Secure ComputationNishanth Chandran, Pouyan Forghani, Juan A. Garay, Rafail Ostrovsky, Rutvik Patel, Vassilis Zikas. iacr, 2021:1398, 2021. [doi]
- Universally Composable Almost-Everywhere Secure ComputationNishanth Chandran, Pouyan Forghani, Juan A. Garay, Rafail Ostrovsky, Rutvik Patel, Vassilis Zikas. citc 2022: [doi]
- Universally Composable Secure Computation with (Malicious) Physically Uncloneable FunctionsRafail Ostrovsky, Alessandra Scafuro, Ivan Visconti, Akshay Wadia. iacr, 2012:143, 2012. [doi]
- Universally Composable Secure Computation with (Malicious) Physically Uncloneable FunctionsRafail Ostrovsky, Alessandra Scafuro, Ivan Visconti, Akshay Wadia. eurocrypt 2013: 702-718 [doi]
- Universally Composable Two-Party and Multi-Party Secure ComputationRan Canetti, Yehuda Lindell, Rafail Ostrovsky, Amit Sahai. iacr, 2002:140, 2002. [doi]
- Universally composable two-party and multi-party secure computationRan Canetti, Yehuda Lindell, Rafail Ostrovsky, Amit Sahai. stoc 2002: 494-503 [doi]