Back to Results
First PageMeta Content
Cryptography / Secure multi-party computation / Fault-tolerant computer systems / Consensus / Secure two-party computation / Ciphertext indistinguishability / Raspberry Pi


Realistic Failures in Secure Multi-Party Computation⋆ Vassilis Zikas1 , Sarah Hauser2 , and Ueli Maurer1 Department of Computer Science, ETH Zurich, 8092 Zurich, Switzerland 1 {vzikas,maurer}@inf.ethz.ch, 2
Add to Reading List

Document Date: 2011-02-19 14:29:40


Open Document

File Size: 244,34 KB

Share Result on Facebook