Constant-Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model

Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

Standard

Constant-Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model. / Hazay, Carmit; Polychroniadou, Antigoni; Venkitasubramaniam, Muthuramakrishnan .

Public-Key Cryptography: PKC 2017. ed. / Serge Fehr. Vol. 10175 Berlin, Heidelberg : Springer VS, 2017. p. 428-460 (Lecture Notes in Computer Science; No. 10175).

Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

Harvard

Hazay, C, Polychroniadou, A & Venkitasubramaniam, M 2017, Constant-Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model. in S Fehr (ed.), Public-Key Cryptography: PKC 2017. vol. 10175, Springer VS, Berlin, Heidelberg, Lecture Notes in Computer Science, no. 10175, pp. 428-460 , 20th IACR International Conference on Practice and Theory of Public-Key Cryptography, PKC 2017, Amsterdam, Netherlands, 28/03/2017. https://doi.org/10.1007/978-3-662-54388-7_15

APA

Hazay, C., Polychroniadou, A., & Venkitasubramaniam, M. (2017). Constant-Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model. In S. Fehr (Ed.), Public-Key Cryptography: PKC 2017 (Vol. 10175, pp. 428-460 ). Springer VS. Lecture Notes in Computer Science, No. 10175 https://doi.org/10.1007/978-3-662-54388-7_15

CBE

Hazay C, Polychroniadou A, Venkitasubramaniam M. 2017. Constant-Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model. Fehr S, editor. In Public-Key Cryptography: PKC 2017. Berlin, Heidelberg: Springer VS. pp. 428-460 . (Lecture Notes in Computer Science; No. 10175). https://doi.org/10.1007/978-3-662-54388-7_15

MLA

Hazay, Carmit, Antigoni Polychroniadou and Muthuramakrishnan Venkitasubramaniam "Constant-Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model". Fehr, Serge (ed.). Public-Key Cryptography: PKC 2017. Berlin, Heidelberg: Springer VS. (Lecture Notes in Computer Science; Journal number 10175). 2017, 428-460 . https://doi.org/10.1007/978-3-662-54388-7_15

Vancouver

Hazay C, Polychroniadou A, Venkitasubramaniam M. Constant-Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model. In Fehr S, editor, Public-Key Cryptography: PKC 2017. Vol. 10175. Berlin, Heidelberg: Springer VS. 2017. p. 428-460 . (Lecture Notes in Computer Science; No. 10175). https://doi.org/10.1007/978-3-662-54388-7_15

Author

Hazay, Carmit ; Polychroniadou, Antigoni ; Venkitasubramaniam, Muthuramakrishnan . / Constant-Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model. Public-Key Cryptography: PKC 2017. editor / Serge Fehr. Vol. 10175 Berlin, Heidelberg : Springer VS, 2017. pp. 428-460 (Lecture Notes in Computer Science; No. 10175).

Bibtex

@inproceedings{ff1fd374c9054ad4adf605265fc955d1,
title = "Constant-Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model",
author = "Carmit Hazay and Antigoni Polychroniadou and Muthuramakrishnan Venkitasubramaniam",
year = "2017",
doi = "10.1007/978-3-662-54388-7_15",
language = "English",
isbn = "978-3-662-54387-0",
volume = "10175",
series = "Lecture Notes in Computer Science",
publisher = "Springer VS",
number = "10175",
pages = "428--460 ",
editor = "Fehr, {Serge }",
booktitle = "Public-Key Cryptography",
note = "20th IACR International Conference on Practice and Theory of Public-Key Cryptography, PKC 2017 ; Conference date: 28-03-2017 Through 31-03-2017",

}

RIS

TY - GEN

T1 - Constant-Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model

AU - Hazay, Carmit

AU - Polychroniadou, Antigoni

AU - Venkitasubramaniam, Muthuramakrishnan

PY - 2017

Y1 - 2017

U2 - 10.1007/978-3-662-54388-7_15

DO - 10.1007/978-3-662-54388-7_15

M3 - Article in proceedings

SN - 978-3-662-54387-0

VL - 10175

T3 - Lecture Notes in Computer Science

SP - 428

EP - 460

BT - Public-Key Cryptography

A2 - Fehr, Serge

PB - Springer VS

CY - Berlin, Heidelberg

T2 - 20th IACR International Conference on Practice and Theory of Public-Key Cryptography, PKC 2017

Y2 - 28 March 2017 through 31 March 2017

ER -