Efficient Secure Two-Party Protocols: Techniques and Constructions photograph

Efficient Secure Two-Party Protocols: Techniques And Constructions

Use attributes for filter !
Google books books.google.com
Originally published 2010
Authors Yehuda Lindell
Carmit Hazay
Date of Reg.
Date of Upd.
ID2015802
Send edit request

About Efficient Secure Two-Party Protocols: Techniques And Constructions


The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation – both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. . . .

Related Persons

Next Profile ❯