<--- Back to Details
First PageDocument Content
YAK / Secure two-party computation / Secure multi-party computation / Communications protocol / Oblivious transfer / Cryptographic protocols / Data / Information
Date: 2004-10-23 17:30:48
YAK
Secure two-party computation
Secure multi-party computation
Communications protocol
Oblivious transfer
Cryptographic protocols
Data
Information

Automatic Generation of Two-Party Computations (Extended Abstract) Philip MacKenzie∗

Add to Reading List

Source URL: www.cs.cmu.edu

Download Document from Source Website

File Size: 166,76 KB

Share Document on Facebook

Similar Documents

Communications Protocol Category: Number: Audience: Issued: Owner:

DocID: 1vcl7 - View Document

Amateur Radio Continuous Wave Communications Protocol (CW ~ Morse Code) History and Application Tutorial

DocID: 1uYVU - View Document

Florida Department of Transportation (FDOT) Actuated Traffic Signal Controller (ASC) Management Information Base (MIB) and National Transportation Communications for ITS (Intelligent Transportation Systems) Protocol (NTC

DocID: 1ufnI - View Document

Commercial in Confidence EVK LoRes Serial Communications Protocol

DocID: 1u5IT - View Document

MindSet Communications Protocol June 28, 2010 e NeuroSky product families consist of hardware and software components for simple integration of this biosensor technology into consumer and industrial end-applications.

DocID: 1tL86 - View Document