Computationally Secure Oblivious Transfer. Naor, M. & Pinkas, B. J. Cryptology, 18(1):1-35, 2005.
Link
Paper bibtex @article{journals/joc/NaorP05,
added-at = {2005-01-25T00:00:00.000+0100},
author = {Naor, Moni and Pinkas, Benny},
biburl = {https://www.bibsonomy.org/bibtex/2d340ef800394e7e0730d053e3c6a55c2/dblp},
date = {2005-01-25},
description = {dblp},
ee = {http://dx.doi.org/10.1007/s00145-004-0102-6},
interhash = {811f7bfef1c11570c9c8a03b60a56838},
intrahash = {d340ef800394e7e0730d053e3c6a55c2},
journal = {J. Cryptology},
keywords = {dblp},
number = 1,
pages = {1-35},
timestamp = {2005-01-25T00:00:00.000+0100},
title = {Computationally Secure Oblivious Transfer.},
url = {http://dblp.uni-trier.de/db/journals/joc/joc18.html#NaorP05},
volume = 18,
year = 2005
}
Downloads: 0
{"_id":"8xTR8HfjLgok3mZ3R","bibbaseid":"naor-pinkas-computationallysecureoblivioustransfer-2005","authorIDs":[],"author_short":["Naor, M.","Pinkas, B."],"bibdata":{"bibtype":"article","type":"article","added-at":"2005-01-25T00:00:00.000+0100","author":[{"propositions":[],"lastnames":["Naor"],"firstnames":["Moni"],"suffixes":[]},{"propositions":[],"lastnames":["Pinkas"],"firstnames":["Benny"],"suffixes":[]}],"biburl":"https://www.bibsonomy.org/bibtex/2d340ef800394e7e0730d053e3c6a55c2/dblp","date":"2005-01-25","description":"dblp","ee":"http://dx.doi.org/10.1007/s00145-004-0102-6","interhash":"811f7bfef1c11570c9c8a03b60a56838","intrahash":"d340ef800394e7e0730d053e3c6a55c2","journal":"J. Cryptology","keywords":"dblp","number":"1","pages":"1-35","timestamp":"2005-01-25T00:00:00.000+0100","title":"Computationally Secure Oblivious Transfer.","url":"http://dblp.uni-trier.de/db/journals/joc/joc18.html#NaorP05","volume":"18","year":"2005","bibtex":"@article{journals/joc/NaorP05,\n added-at = {2005-01-25T00:00:00.000+0100},\n author = {Naor, Moni and Pinkas, Benny},\n biburl = {https://www.bibsonomy.org/bibtex/2d340ef800394e7e0730d053e3c6a55c2/dblp},\n date = {2005-01-25},\n description = {dblp},\n ee = {http://dx.doi.org/10.1007/s00145-004-0102-6},\n interhash = {811f7bfef1c11570c9c8a03b60a56838},\n intrahash = {d340ef800394e7e0730d053e3c6a55c2},\n journal = {J. Cryptology},\n keywords = {dblp},\n number = 1,\n pages = {1-35},\n timestamp = {2005-01-25T00:00:00.000+0100},\n title = {Computationally Secure Oblivious Transfer.},\n url = {http://dblp.uni-trier.de/db/journals/joc/joc18.html#NaorP05},\n volume = 18,\n year = 2005\n}\n\n","author_short":["Naor, M.","Pinkas, B."],"key":"journals/joc/NaorP05","id":"journals/joc/NaorP05","bibbaseid":"naor-pinkas-computationallysecureoblivioustransfer-2005","role":"author","urls":{"Link":"http://dx.doi.org/10.1007/s00145-004-0102-6","Paper":"http://dblp.uni-trier.de/db/journals/joc/joc18.html#NaorP05"},"keyword":["dblp"],"downloads":0},"bibtype":"article","biburl":"http://www.bibsonomy.org/bib/author/benny pinkas?items=1000","creationDate":"2019-08-20T14:01:14.203Z","downloads":0,"keywords":["dblp"],"search_terms":["computationally","secure","oblivious","transfer","naor","pinkas"],"title":"Computationally Secure Oblivious Transfer.","year":2005,"dataSources":["cqD7CZfhPQfyEKZAn"]}