Back to Results
First PageMeta Content
Secure two-party computation / Oblivious transfer / Alice and Bob / Cryptography / Cryptographic protocols / Secure multi-party computation


Review of5 Efficient Secure Two-Party Protocols: Techniques and Constructions by Carmit Hazay and Yehuda Lindell Springer, 2010 Reviewed by Jonathan Katz
Add to Reading List

Document Date: 2012-02-29 01:45:21


Open Document

File Size: 106,52 KB

Share Result on Facebook

Country

United States / /

Facility

University of Maryland / /

IndustryTerm

generic protocols / boolean circuit computing / keyword search / /

Organization

University of Maryland / European Union / /

Person

Jonathan Katz / /

Position

researcher / theoretical computer scientist / /

ProvinceOrState

Maryland / /

RadioStation

Katz 18 / /

Technology

cryptography / generic protocols / /

SocialTag