First Page | Document Content | |
---|---|---|
Date: 2012-02-29 01:45:21Secure two-party computation Oblivious transfer Alice and Bob Cryptography Cryptographic protocols Secure multi-party computation | Review of5 Efficient Secure Two-Party Protocols: Techniques and Constructions by Carmit Hazay and Yehuda Lindell Springer, 2010 Reviewed by Jonathan KatzAdd to Reading ListSource URL: u.cs.biu.ac.ilDownload Document from Source WebsiteFile Size: 106,52 KBShare Document on Facebook |