Back to Results
First PageMeta Content
Secure two-party computation / Zero-knowledge proof / Commitment scheme / Oblivious transfer / Computational indistinguishability / Oded Goldreich / Ciphertext indistinguishability / Man-in-the-middle attack / Cryptography / Cryptographic protocols / Secure multi-party computation


Efficient Secure Two-Party Protocols: Techniques and Constructions
Add to Reading List

Document Date: 2014-09-16 07:30:08


Open Document

File Size: 270,33 KB

Share Result on Facebook
UPDATE