![Cryptography / Secure multi-party computation / Fault-tolerant computer systems / Consensus / Secure two-party computation / Ciphertext indistinguishability / Raspberry Pi Cryptography / Secure multi-party computation / Fault-tolerant computer systems / Consensus / Secure two-party computation / Ciphertext indistinguishability / Raspberry Pi](https://www.pdfsearch.io/img/22da70a9d3c0ec7c31333246726078a2.jpg) Date: 2011-02-19 14:29:40Cryptography Secure multi-party computation Fault-tolerant computer systems Consensus Secure two-party computation Ciphertext indistinguishability Raspberry Pi | | Realistic Failures in Secure Multi-Party Computation⋆ Vassilis Zikas1 , Sarah Hauser2 , and Ueli Maurer1 Department of Computer Science, ETH Zurich, 8092 Zurich, Switzerland 1 {vzikas,maurer}@inf.ethz.ch, 2Add to Reading ListSource URL: www.cs.rpi.eduDownload Document from Source Website File Size: 244,34 KBShare Document on Facebook
|