![Secure multi-party computation / IP / Adversary model / Transmission Control Protocol / Cryptography / Mathematics / Computing / Cryptographic protocols / Applied mathematics / Analysis of algorithms Secure multi-party computation / IP / Adversary model / Transmission Control Protocol / Cryptography / Mathematics / Computing / Cryptographic protocols / Applied mathematics / Analysis of algorithms](https://www.pdfsearch.io/img/2cfc8027dc5f35fd41fdb9b890fa54c4.jpg)
| Document Date: 2007-01-08 13:33:41 Open Document File Size: 246,29 KBShare Result on Facebook
Currency pence / GBP / cent / / / Facility By building / University of Maryland / / IndustryTerm secure protocols / logarithmicround protocols / n-party protocol / t-secure protocol / round protocols / studied protocols / constant-round protocols / polynomial-time algorithm / above protocol / polynomial-round protocol / / Organization Pi / University of Maryland / National Science Foundation / Pj / US-Israel Binational Science Foundation / / Person Pn / / Position player / honest player / / ProvinceOrState Maryland / / Technology t-secure protocol / super-logarithmic round protocols / above protocol / MPC protocol / n-party protocol / MPC protocols / logarithmicround protocols / PKI / polynomial-time algorithm / constant-round protocols / polynomial-round protocol / simulation / 1 Introduction Protocols / also studied protocols / be realized using a PKI / /
SocialTag |