Cryptology ePrint Archive: Report 2013/079
Available versions in chronological order
20130220:094848 (posted 20-Feb-2013 09:48:48 UTC)
Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries
Yehuda Lindell
20130523:140047 (posted 23-May-2013 14:00:47 UTC)
Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries
Yehuda Lindell
20130527:140804 (posted 27-May-2013 14:08:04 UTC)
Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries
Yehuda Lindell
Publication Info: An extended abstract appeared at CRYPTO 2013; this is the full version.
20130529:061018 (posted 29-May-2013 06:10:18 UTC)
Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries
Yehuda Lindell
Publication Info: An extended abstract appeared at CRYPTO 2013; this is the full version.
20130605:053747 (posted 05-Jun-2013 05:37:47 UTC)
Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries
Yehuda Lindell
Publication Info: An extended abstract appeared at CRYPTO 2013; this is the full version.
20130605:065752 (posted 05-Jun-2013 06:57:52 UTC)
Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries
Yehuda Lindell
Publication Info: An extended abstract appeared at CRYPTO 2013; this is the full version.
20130606:075338 (posted 06-Jun-2013 07:53:38 UTC)
Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries
Yehuda Lindell
Publication Info: An extended abstract appeared at CRYPTO 2013; this is the full version.
20130606:131139 (posted 06-Jun-2013 13:11:39 UTC)
Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries
Yehuda Lindell
Publication Info: An extended abstract appeared at CRYPTO 2013; this is the full version.
20131223:074101 (posted 23-Dec-2013 07:41:01 UTC)
Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries
Yehuda Lindell
Original publication (with major differences): IACR-CRYPTO-2013
20140108:115535 (posted 08-Jan-2014 11:55:35 UTC)
Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries
Yehuda Lindell
Original publication (with major differences): IACR-CRYPTO-2013
20140209:134709 (posted 09-Feb-2014 13:47:09 UTC)
Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries
Yehuda Lindell
Original publication (with major differences): IACR-CRYPTO-2013
20140221:000405 (posted 21-Feb-2014 00:04:05 UTC)
Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries
Yehuda Lindell
Original publication (with major differences): IACR-CRYPTO-2013
20140326:072557 (posted 26-Mar-2014 07:25:57 UTC)
Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries
Yehuda Lindell
Original publication (with major differences): IACR-CRYPTO-2013
20140724:134141 (posted 24-Jul-2014 13:41:41 UTC)
Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries
Yehuda Lindell
Original publication (with major differences): IACR-CRYPTO-2013
20140901:093437 (posted 01-Sep-2014 09:34:37 UTC)
Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries
Yehuda Lindell
Original publication (with major differences): IACR-CRYPTO-2013
20140908:081531 (posted 08-Sep-2014 08:15:31 UTC)
Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries
Yehuda Lindell
Original publication (with major differences): IACR-CRYPTO-2013
20150107:203106 (posted 07-Jan-2015 20:31:06 UTC)
Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries
Yehuda Lindell
Original publication (with major differences): IACR-CRYPTO-2013
20150208:062920 (posted 08-Feb-2015 06:29:20 UTC)
Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries
Yehuda Lindell
Original publication (with major differences): IACR-CRYPTO-2013
[
Cryptology ePrint archive
]