Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries

@inproceedings{Lindell2013FastCB,
  title={Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries},
  author={Yehuda Lindell},
  booktitle={CRYPTO},
  year={2013}
}
Highly Influential
This paper has highly influenced 13 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 169 citations. REVIEW CITATIONS

From This Paper

Topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 109 extracted citations

Fast Optimistically Fair Cut-and-Choose 2PC

IACR Cryptology ePrint Archive • 2015
View 10 Excerpts
Highly Influenced

Revisiting LEGOs: Optimizations, Analysis, and their Limit

IACR Cryptology ePrint Archive • 2015
View 9 Excerpts
Highly Influenced

Practical UC security with a Global Random Oracle

ACM Conference on Computer and Communications Security • 2014
View 4 Excerpts
Highly Influenced

DUPLO: Unifying Cut-and-Choose for Garbled Circuits

ACM Conference on Computer and Communications Security • 2017
View 4 Excerpts
Highly Influenced

170 Citations

02040'14'16'18
Citations per Year
Semantic Scholar estimates that this publication has 170 citations based on the available data.

See our FAQ for additional information.

Similar Papers

Loading similar papers…