CryptoDB
Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs
Authors: | |
---|---|
Download: | |
Conference: | TCC 2005 |
BibTeX
@inproceedings{tcc-2005-3690, title={Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs}, booktitle={Theory of Cryptography, Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings}, series={Lecture Notes in Computer Science}, publisher={Springer}, volume={3378}, pages={128-149}, url={https://iacr.org/archive/tcc2005/3378_130/3378_130.pdf}, doi={10.1007/978-3-540-30576-7_8}, author={Jonathan Katz and Yehuda Lindell}, year=2005 }