A Proof of Security of Yao's Protocol for Two-Party Computation. Lindell, Y. & Pinkas, B. J. Cryptology, 22(2):161-188, 2009. Link Paper bibtex @article{journals/joc/LindellP09,
added-at = {2018-11-30T00:00:00.000+0100},
author = {Lindell, Yehuda and Pinkas, Benny},
biburl = {https://www.bibsonomy.org/bibtex/2d0b6e06ba70da78ef24cb9f05533e323/dblp},
ee = {https://doi.org/10.1007/s00145-008-9036-8},
interhash = {fef8014bbfbcc2450856ba4aaa3ed052},
intrahash = {d0b6e06ba70da78ef24cb9f05533e323},
journal = {J. Cryptology},
keywords = {dblp},
number = 2,
pages = {161-188},
timestamp = {2018-12-01T11:40:00.000+0100},
title = {A Proof of Security of Yao's Protocol for Two-Party Computation.},
url = {http://dblp.uni-trier.de/db/journals/joc/joc22.html#LindellP09},
volume = 22,
year = 2009
}
Downloads: 0
{"_id":"kYZaSauBBBxmnjSn6","bibbaseid":"lindell-pinkas-aproofofsecurityofyaosprotocolfortwopartycomputation-2009","authorIDs":[],"author_short":["Lindell, Y.","Pinkas, B."],"bibdata":{"bibtype":"article","type":"article","added-at":"2018-11-30T00:00:00.000+0100","author":[{"propositions":[],"lastnames":["Lindell"],"firstnames":["Yehuda"],"suffixes":[]},{"propositions":[],"lastnames":["Pinkas"],"firstnames":["Benny"],"suffixes":[]}],"biburl":"https://www.bibsonomy.org/bibtex/2d0b6e06ba70da78ef24cb9f05533e323/dblp","ee":"https://doi.org/10.1007/s00145-008-9036-8","interhash":"fef8014bbfbcc2450856ba4aaa3ed052","intrahash":"d0b6e06ba70da78ef24cb9f05533e323","journal":"J. Cryptology","keywords":"dblp","number":"2","pages":"161-188","timestamp":"2018-12-01T11:40:00.000+0100","title":"A Proof of Security of Yao's Protocol for Two-Party Computation.","url":"http://dblp.uni-trier.de/db/journals/joc/joc22.html#LindellP09","volume":"22","year":"2009","bibtex":"@article{journals/joc/LindellP09,\n added-at = {2018-11-30T00:00:00.000+0100},\n author = {Lindell, Yehuda and Pinkas, Benny},\n biburl = {https://www.bibsonomy.org/bibtex/2d0b6e06ba70da78ef24cb9f05533e323/dblp},\n ee = {https://doi.org/10.1007/s00145-008-9036-8},\n interhash = {fef8014bbfbcc2450856ba4aaa3ed052},\n intrahash = {d0b6e06ba70da78ef24cb9f05533e323},\n journal = {J. Cryptology},\n keywords = {dblp},\n number = 2,\n pages = {161-188},\n timestamp = {2018-12-01T11:40:00.000+0100},\n title = {A Proof of Security of Yao's Protocol for Two-Party Computation.},\n url = {http://dblp.uni-trier.de/db/journals/joc/joc22.html#LindellP09},\n volume = 22,\n year = 2009\n}\n\n","author_short":["Lindell, Y.","Pinkas, B."],"key":"journals/joc/LindellP09","id":"journals/joc/LindellP09","bibbaseid":"lindell-pinkas-aproofofsecurityofyaosprotocolfortwopartycomputation-2009","role":"author","urls":{"Link":"https://doi.org/10.1007/s00145-008-9036-8","Paper":"http://dblp.uni-trier.de/db/journals/joc/joc22.html#LindellP09"},"keyword":["dblp"],"downloads":0},"bibtype":"article","biburl":"http://www.bibsonomy.org/bib/author/benny pinkas?items=1000","creationDate":"2019-08-20T14:01:14.082Z","downloads":0,"keywords":["dblp"],"search_terms":["proof","security","yao","protocol","two","party","computation","lindell","pinkas"],"title":"A Proof of Security of Yao's Protocol for Two-Party Computation.","year":2009,"dataSources":["cqD7CZfhPQfyEKZAn"]}