Efficient Secure Two-Party Protocols: Techniques And Constructions
| Use attributes for filter ! | |
| Google books | books.google.com |
|---|---|
| Originally published | 2010 |
| Authors | Yehuda Lindell |
| Carmit Hazay | |
| Date of Reg. | |
| Date of Upd. | |
| ID | 2015802 |
About Efficient Secure Two-Party Protocols: Techniques And Constructions
The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation – both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. . . .