<--- Back to Details
First PageDocument Content
YAK / Secure two-party computation / Secure multi-party computation / Communications protocol / Oblivious transfer / Cryptographic protocols / Data / Information
Date: 2004-10-23 17:30:48
YAK
Secure two-party computation
Secure multi-party computation
Communications protocol
Oblivious transfer
Cryptographic protocols
Data
Information

Automatic Generation of Two-Party Computations (Extended Abstract) Philip MacKenzie∗

Add to Reading List

Source URL: www.cs.cmu.edu

Download Document from Source Website

File Size: 166,76 KB

Share Document on Facebook

Similar Documents

OUR STORY Your path to discovering Yak & Yeti begins at the foothills of the Himalayan Mountains, a major crossroads of cultures. The majestic sight of Mount Everest is just above the horizon. Traders, pilgrims, and

DocID: 1vooh - View Document

Page 1 of 9 AN ANNUAL ADVENTURE (Part 2) Having dropped my Yak 18 off in Hungary on the 6th July for its annual and some panel work it only remained to wait for the collection call. True to his word, Bela phoned on the

DocID: 1v2Kq - View Document

AN ANNUAL ADVENTURE? The time had come. With the annual on my Yak 18T HA-YAV looming a decision had to be made on whether have the work done at White Waltham or to fly it to Hungary where it is registered in order to ope

DocID: 1uE9U - View Document

  The Swastika, Stepped Shrine, Priest, Horned Eagle, and Wild Yak Rider — Prominent antecedents of Yungdrung Bon figurative and symbolic traditions in the rock art of Upper Tibet1

DocID: 1u8fS - View Document

The “Known” figures specified by CIVA for powered aircraft in 2017 are: Intermediate power / Yak-52 category Max total K allowed = 200 Advanced power category Max total K allowed = 320

DocID: 1tq8F - View Document