![Cryptographic protocols / Mathematics / Secure multi-party computation / Linear algebra / Valuation / Linear combination / Finite field Cryptographic protocols / Mathematics / Secure multi-party computation / Linear algebra / Valuation / Linear combination / Finite field](https://www.pdfsearch.io/img/3642406c86bbee3fc4d1cbd54887d523.jpg) Date: 2015-06-09 02:13:24Cryptographic protocols Mathematics Secure multi-party computation Linear algebra Valuation Linear combination Finite field | | Efficient Multi-Party Computation: from Passive to Active Security via Secure SIMD Circuits Daniel Genkin12 , Yuval Ishai1 , and Antigoni Polychroniadou3 1Add to Reading ListSource URL: web.eecs.umich.eduDownload Document from Source Website File Size: 493,49 KBShare Document on Facebook
|