Cryptology ePrint Archive: Report 2013/079

Available versions in chronological order


Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries
Yehuda Lindell

Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries
Yehuda Lindell

Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries
Yehuda Lindell
Publication Info: An extended abstract appeared at CRYPTO 2013; this is the full version.

Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries
Yehuda Lindell
Publication Info: An extended abstract appeared at CRYPTO 2013; this is the full version.

Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries
Yehuda Lindell
Publication Info: An extended abstract appeared at CRYPTO 2013; this is the full version.

Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries
Yehuda Lindell
Publication Info: An extended abstract appeared at CRYPTO 2013; this is the full version.

Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries
Yehuda Lindell
Publication Info: An extended abstract appeared at CRYPTO 2013; this is the full version.

Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries
Yehuda Lindell
Publication Info: An extended abstract appeared at CRYPTO 2013; this is the full version.

Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries
Yehuda Lindell
Original publication (with major differences): IACR-CRYPTO-2013

Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries
Yehuda Lindell
Original publication (with major differences): IACR-CRYPTO-2013

Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries
Yehuda Lindell
Original publication (with major differences): IACR-CRYPTO-2013

Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries
Yehuda Lindell
Original publication (with major differences): IACR-CRYPTO-2013

Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries
Yehuda Lindell
Original publication (with major differences): IACR-CRYPTO-2013


[ Cryptology ePrint archive ]