Back to Results
First PageMeta Content
Secure two-party computation / Information-theoretic security / Homomorphic encryption / Public-key cryptography / Quantum cryptography / Cryptographic primitive / Noisy-storage model / Universal composability / Cryptography / Cryptographic protocols / Secure multi-party computation


Document Date: 2011-04-04 06:52:20


Open Document

File Size: 144,24 KB

Share Result on Facebook
UPDATE