Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by Ran Canetti
Public-Coin Concurrent Zero-Knowledge in the Global Hash Model
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Bounding the Power of Preemption in Randomized Scheduling
SIAM Journal on Computing
Mathematics
Computer Science
On the Limitations of Universally Composable Two-Party Computation Without Set-Up Assumptions
Journal of Cryptology
Applied Mathematics
Computer Science Applications
Software
Towards a Theory of Extractable Functions
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Secure Computation Without Authentication
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Universally Composable Notions of Key Exchange and Secure Channels
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Adaptively-Secure, Non-Interactive Public-Key Encryption
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Universal Composition With Joint State
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science