Freiling, Felix C.Mittal, NeerajPenso, Lucia DraqueCremers, Armin B.Manthey, RainerMartini, PeterSteinhage, Volker2019-10-112019-10-1120053-88579-396-2https://dl.gi.de/handle/20.500.12116/28071We present a survey of different techniques used by the authors to transform a security or fault-tolerance problem into another with a known solution. We consider the following two cases: (1) reducing a security problem into a fault-tolerance problem; (2) reducing a fault-tolerant problem into its fault-intolerant version. In these cases it is possible to reuse known solutions to construct new efficient algorithms.enTransformations in secure and fault-tolerant distributed computationText/Conference Paper1617-5468