Related Books

Efficient Secure Two-Party Protocols
Language: en
Pages: 271
Authors: Carmit Hazay
Categories: Computers
Type: BOOK - Published: 2010-11-02 - Publisher: Springer Science & Business Media

DOWNLOAD EBOOK

In the setting of multiparty computation, sets of two or more parties with p- vate inputs wish to jointly compute some (predetermined) function of their inputs.
Engineering Secure Two-Party Computation Protocols
Language: en
Pages: 156
Authors:
Categories:
Type: BOOK - Published: 2012-09-01 - Publisher: Springer

DOWNLOAD EBOOK

Algorithmic Strategies for Solving Complex Problems in Cryptography
Language: en
Pages: 321
Authors: Balasubramanian, Kannan
Categories: Computers
Type: BOOK - Published: 2017-08-16 - Publisher: IGI Global

DOWNLOAD EBOOK

Cryptography is a field that is constantly advancing, due to exponential growth in new technologies within the past few decades. Applying strategic algorithms t
A Pragmatic Introduction to Secure Multi-Party Computation
Language: en
Pages: 190
Authors: David Evans
Categories:
Type: BOOK - Published: 2018-12-19 - Publisher: Foundations and Trends (R) in Privacy and Security

DOWNLOAD EBOOK

Practitioners and researchers seeking a concise, accessible introduction to secure multi-party computation which quickly enables them to build practical systems
Advances in Cryptology -- CRYPTO 2012
Language: en
Pages: 902
Authors: Reihaneh Safavi-Naini
Categories: Computers
Type: BOOK - Published: 2012-08-08 - Publisher: Springer

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the 32nd Annual International Cryptology Conference, CRYPTO 2012, held in Santa Barbara, CA, USA, in August 20