Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries

Yehuda Lindell. Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries. IACR Cryptology ePrint Archive, 2013:79, 2013. [doi]

References

No references recorded for this publication.

Cited by

No citations of this publication recorded.