×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents tagged [secure multiparty computation]
Home >
secure multiparty computation
Lossy Encryption: Constructions from General Assumptions and ...
1.209 views
Modulo Reduction for Paillier Encryptions and Application to ...
596 views
Inaugural Lecture - February 19th 2008 1 From Fish to Phishing Kenny Paterson Information Security Group Mathematics Department Royal Holloway, University.
216 views
SECURE DATA CLOUD PROJECT: LEGAL CHALLENGES by Vaishali Mirchandani
267 views
Online Session & Discussion Mr. Satyadhar Joshi
[email protected]
.
222 views
An brief tour of Differential Privacy Avrim Blum Computer Science Dept Your guide:
214 views
ITIS 6167/8167: Network and Information Security Weichao Wang.
223 views
Survey: Secure Composition of Multiparty Protocols Yehuda Lindell IBM T.J. Watson.
213 views
Tutorial on Secure Multi-Party Computation Yehuda Lindell IBM T.J.Watson.
242 views
Rafael Pass Cornell University Constant-round Non-malleability From Any One-way Function Joint work with Huijia (Rachel) Lin.
213 views
Information-Theoretic Security and Security under Composition Eyal Kushilevitz (Technion) Yehuda Lindell (Bar-Ilan University) Tal Rabin (IBM T.J. Watson)
215 views
Towards a Paradigm for Robust Distributed Programming
28 views
Next >