<--- Back to Details
First PageDocument Content
Cryptography / Secure multi-party computation / Fault-tolerant computer systems / Consensus / Secure two-party computation / Ciphertext indistinguishability / Raspberry Pi
Date: 2011-02-19 14:29:40
Cryptography
Secure multi-party computation
Fault-tolerant computer systems
Consensus
Secure two-party computation
Ciphertext indistinguishability
Raspberry Pi

Realistic Failures in Secure Multi-Party Computation⋆ Vassilis Zikas1 , Sarah Hauser2 , and Ueli Maurer1 Department of Computer Science, ETH Zurich, 8092 Zurich, Switzerland 1 {vzikas,maurer}@inf.ethz.ch, 2

Add to Reading List

Source URL: www.cs.rpi.edu

Download Document from Source Website

File Size: 244,34 KB

Share Document on Facebook

Similar Documents