First Page | Document Content | |
---|---|---|
![]() Date: 2011-04-04 06:52:20Secure two-party computation Information-theoretic security Homomorphic encryption Public-key cryptography Quantum cryptography Cryptographic primitive Noisy-storage model Universal composability Cryptography Cryptographic protocols Secure multi-party computation | Source URL: u.cs.biu.ac.ilDownload Document from Source WebsiteFile Size: 144,24 KBShare Document on Facebook |