Cited By
View all- Benhamouda FCouteau GPointcheval DWee H(2022)Implicit Zero-Knowledge Arguments and Applications to the Malicious SettingAdvances in Cryptology -- CRYPTO 201510.1007/978-3-662-48000-7_6(107-129)Online publication date: 10-Mar-2022
- Blazy OChevalier CVu Q(2019)Post-Quantum UC-Secure Oblivious Transfer in the Standard Model with Adaptive CorruptionsProceedings of the 14th International Conference on Availability, Reliability and Security10.1145/3339252.3339280(1-6)Online publication date: 26-Aug-2019
- Xiong HWu YLu Z(2019)A Survey of Group Key Agreement Protocols with Constant RoundsACM Computing Surveys10.1145/331846052:3(1-32)Online publication date: 18-Jun-2019
- Show More Cited By