International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs

Authors:
Jonathan Katz
Yehuda Lindell
Download:
DOI: 10.1007/978-3-540-30576-7_8
URL: https://iacr.org/archive/tcc2005/3378_130/3378_130.pdf
Search ePrint
Search Google
Conference: TCC 2005
BibTeX
@inproceedings{tcc-2005-3690,
  title={Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs},
  booktitle={Theory of Cryptography, Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings},
  series={Lecture Notes in Computer Science},
  publisher={Springer},
  volume={3378},
  pages={128-149},
  url={https://iacr.org/archive/tcc2005/3378_130/3378_130.pdf},
  doi={10.1007/978-3-540-30576-7_8},
  author={Jonathan Katz and Yehuda Lindell},
  year=2005
}