Back to Results
First PageMeta Content
Secure two-party computation / Oblivious transfer / Alice and Bob / Cryptography / Cryptographic protocols / Secure multi-party computation


Review of5 Efficient Secure Two-Party Protocols: Techniques and Constructions by Carmit Hazay and Yehuda Lindell Springer, 2010 Reviewed by Jonathan Katz
Add to Reading List

Document Date: 2012-02-29 01:45:21


Open Document

File Size: 106,52 KB

Share Result on Facebook
UPDATE