Back to Results
First PageMeta Content
Quantum complexity theory / Computational complexity theory / Cryptography / Functions and mappings / Secure multi-party computation / Secure two-party computation / Communication complexity / Limit of a function / Pi / Cryptographic protocol / PP / Approximation algorithm


Secure Multiparty Computation of Approximations∗ Joan Feigenbaum† Yuval Ishai‡ Martin J. Straussk
Add to Reading List

Document Date: 2006-09-25 10:55:42


Open Document

File Size: 411,92 KB

Share Result on Facebook