Note: the order of the papers here is according to the year of the conference in which the paper was presented.

Strict Polynomial-Time in Simulation and Extraction

Universally Composable Two-Party and Multi-Party Secure Computation

On the Composition of Authenticated Byzantine Agreement

Sequential Composition of Protocols without Simultaneous Termination

Secure Computation Without Agreement

Skip to content