Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
26
views
18
references
Top references
cited by
7
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,091
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology — EUROCRYPT 2002
Unconditional Byzantine Agreement and Multi-party Computation Secure against Dishonest Minorities from Scratch
other
Author(s):
Matthias Fitzi
,
Nicolas Gisin
,
Ueli Maurer
,
Oliver von Rotz
Publication date
(Online):
April 29 2002
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Further versions
open (via free pdf)
Powered by
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
International Journal of Automation & Digital Transformation
Most cited references
18
Record
: found
Abstract
: not found
Article
: not found
Reaching Agreement in the Presence of Faults
M. Pease
,
R. Shostak
,
L. Lamport
(1980)
0
comments
Cited
171
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
How to play ANY mental game
O Goldreich
,
S Micali
,
A. Wigderson
(1987)
0
comments
Cited
136
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Protocols for secure computations
Andrew Yao
(1982)
0
comments
Cited
100
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2002
Publication date (Online):
April 29 2002
Pages
: 482-501
DOI:
10.1007/3-540-46035-7_32
SO-VID:
b028c30d-c620-4013-bc12-75d7edbc38eb
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 222
BDD-Based Cryptanalysis of Keystream Generators
pp. 352
On Deniability in Quantum Key Exchange
pp. 110
Indistinguishability of Random Systems
pp. 209
Fast Correlation Attacks: An Algorithmic Point of View
pp. 272
Optimal Security Proofs for PSS and Other Signature Schemes
pp. 299
Cryptanalysis of the Revised NTRU Signature Scheme
pp. 321
Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions
pp. 337
Universally Composable Notions of Key Exchange and Secure Channels
pp. 384
A Block-Cipher Mode of Operation for Parallelizable Message Authentication
pp. 400
Efficient Generic Forward-Secure Signatures with an Unbounded Number of Time Periods
pp. 418
From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security
pp. 450
Traitor Tracing with Constant Transmission Rate
pp. 466
Toward Hierarchical Identity-Based Encryption
pp. 482
Unconditional Byzantine Agreement and Multi-party Computation Secure against Dishonest Minorities from Scratch
pp. 502
Perfectly Secure Message Transmission Revisited
pp. 518
Degree of Composition of Highly Nonlinear Functions and Applications to Higher Order Differential Cryptanalysis
pp. 534
Security Flaws Induced by CBC Padding — Applications to SSL, IPSEC, WTLS...
Similar content
2,091
Predicting dishonest actions using the theory of planned behavior
Authors:
L. Beck
,
I Ajzen
,
Fábio de L. BECK
Editorial: Dishonest Behavior, from Theory to Practice
Authors:
Shahar Ayal
,
Guy Hochman
,
Dan Ariely
Male green frogs lower the pitch of acoustic signals in defense of territories: a possible dishonest signal of size?
Authors:
MA Bee
,
SA Perrill
,
PC Owen
See all similar
Cited by
7
On the Power of Correlated Randomness in Secure Computation
Authors:
Yuval Ishai
,
Eyal Kushilevitz
,
Sigurd Meldgaard
…
Quantum Anonymous Transmissions
Authors:
Matthias Christandl
,
Stephanie Wehner
Byzantine Agreement with a Rational Adversary
Authors:
Adam Groce
,
Jonathan Katz
,
Aishwarya Thiruvengadam
…
See all cited by