Back to Results
First PageMeta Content
Secure multi-party computation / Communications protocol / Oblivious transfer / Homomorphic encryption / Transmission Control Protocol / Public-key cryptography / Hamming / Port / Cryptography / Cryptographic protocols / Secure two-party computation


Secure Hamming Distance Based Computation and Its Applications Ayman Jarrous and Benny Pinkas University of Haifa Abstract. This paper examines secure two-party computation of functions which depend only on the Hamming
Add to Reading List

Document Date: 2009-04-09 09:23:00


Open Document

File Size: 264,30 KB

Share Result on Facebook
UPDATE