<--- Back to Details
First PageDocument Content
Cryptography / Mathematics / Secure multi-party computation / Function / Communications protocol / Security parameter / Cryptographic primitive / Secure two-party computation / Cryptographic protocols / Data / Information
Date: 2015-07-03 05:13:02
Cryptography
Mathematics
Secure multi-party computation
Function
Communications protocol
Security parameter
Cryptographic primitive
Secure two-party computation
Cryptographic protocols
Data
Information

Towards a Game Theoretic View of Secure Computation Gilad Asharov∗ Ran Canetti†

Document is deleted from original location.
Use the Download Button below to download from the Web Archive.

Download Document from Web Archive

File Size: 523,53 KB