Handling expected polynomial-time strategies in simulation-based security proofs

From MaRDI portal
Publication:1021232

DOI10.1007/s00145-007-9004-8zbMath1161.94410OpenAlexW2161337669MaRDI QIDQ1021232

Yehuda Lindell, Jonathan N. Katz

Publication date: 8 June 2009

Published in: Journal of Cryptology (Search for Journal in Brave)

Full work available at URL: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.414.8339




Related Items (3)



Cites Work




This page was built for publication: Handling expected polynomial-time strategies in simulation-based security proofs