International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries

Authors:
Yonatan Aumann
Yehuda Lindell
Download:
DOI: 10.1007/978-3-540-70936-7_8
URL: https://iacr.org/archive/tcc2007/43920137/43920137.pdf
Search ePrint
Search Google
Conference: TCC 2007
BibTeX
@inproceedings{tcc-2007-3633,
  title={Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries},
  booktitle={Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series={Lecture Notes in Computer Science},
  publisher={Springer},
  volume={4392},
  pages={137-156},
  url={https://iacr.org/archive/tcc2007/43920137/43920137.pdf},
  doi={10.1007/978-3-540-70936-7_8},
  author={Yonatan Aumann and Yehuda Lindell},
  year=2007
}