Back to Results
First PageMeta Content
Computational complexity theory / Applied mathematics / Cryptography / Mathematics / Message authentication codes / Cryptographic hash functions / VEST


A New Approach to Practical Active-Secure Two-Party Computation 1 1
Add to Reading List

Document Date: 2012-02-14 09:50:59


Open Document

File Size: 754,82 KB

Share Result on Facebook
UPDATE