![Circuit complexity / Theoretical computer science / Computational complexity theory / Cryptographic protocols / Electronic engineering / Theory of computation / Secure multi-party computation / Logic families / Digital circuits / Transistortransistor logic / NC / Circuit Circuit complexity / Theoretical computer science / Computational complexity theory / Cryptographic protocols / Electronic engineering / Theory of computation / Secure multi-party computation / Logic families / Digital circuits / Transistortransistor logic / NC / Circuit](https://www.pdfsearch.io/img/1b8ad37ef0de4f34dd89c348bfc64de0.jpg) Date: 2014-03-20 23:52:12Circuit complexity Theoretical computer science Computational complexity theory Cryptographic protocols Electronic engineering Theory of computation Secure multi-party computation Logic families Digital circuits Transistortransistor logic NC Circuit | | Circuits Resilient to Additive Attacks with Applications to Secure Computation Daniel Genkin Yuval IshaiAdd to Reading ListSource URL: web.eecs.umich.eduDownload Document from Source Website File Size: 336,63 KBShare Document on Facebook
|