Back to Results
First PageMeta Content
Cryptography / Mathematical analysis / Quantum complexity theory / Computational complexity theory / Functions and mappings / Secure multi-party computation / Communication complexity / Secure two-party computation / Limit of a function / Cryptographic protocol / Pi / PP


Secure Multiparty Computation of Approximations∗ Joan Feigenbaum† Yuval Ishai‡ Martin J. Straussk
Add to Reading List

Document Date: 2006-09-25 10:55:42


Open Document

File Size: 411,92 KB

Share Result on Facebook