Télécharger le livre :  Efficient Secure Two-Party Protocols
In the setting of multiparty computation, sets of two or more parties with p- vate inputs wish to jointly compute some (predetermined) function of their inputs. The computation should be such that the outputs received by the parties are correctly distributed, and...

Editeur : Springer
Parution : 2010-11-02
Collection : Information Security and Cryptography PDF

168,79

Téléchargement immédiat
Dès validation de votre commande