International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Two-output Secure Computation With Malicious Adversaries

Authors:
abhi shelat
Chih-hao Shen
Download:
DOI: 10.1007/978-3-642-20465-4_22 (login may be required)
URL: https://www.iacr.org/archive/eurocrypt2011/66320391/66320391.pdf
Search ePrint
Search Google
Conference: EUROCRYPT 2011
BibTeX
@inproceedings{eurocrypt-2011-23629,
  title={Two-output Secure Computation With Malicious Adversaries},
  booktitle={Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques},
  series={Lecture Notes in Computer Science},
  publisher={Springer},
  volume={6632},
  pages={386},
  url={https://www.iacr.org/archive/eurocrypt2011/66320391/66320391.pdf},
  doi={10.1007/978-3-642-20465-4_22},
  author={ abhi shelat and Chih-hao Shen},
  year=2011
}