First Page | Document Content | |
---|---|---|
Date: 2012-02-14 09:50:59Computational complexity theory Applied mathematics Cryptography Mathematics Message authentication codes Cryptographic hash functions VEST | A New Approach to Practical Active-Secure Two-Party Computation 1 1Add to Reading ListSource URL: eprint.iacr.orgDownload Document from Source WebsiteFile Size: 754,82 KBShare Document on Facebook |