Login / Signup

Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries.

Yonatan AumannYehuda Lindell
Published in: J. Cryptol. (2010)
Keyphrases