×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [secure multiparty computation]
Lossy Encryption: Constructions from General Assumptions and
1.210 views
Modulo Reduction for Paillier Encryptions and Application to
596 views
Inaugural Lecture - February 19th 2008 1 From Fish to Phishing Kenny Paterson Information Security Group Mathematics Department Royal Holloway, University
217 views
SECURE DATA CLOUD PROJECT: LEGAL CHALLENGES by Vaishali Mirchandani
267 views
Online Session & Discussion Mr. Satyadhar Joshi
[email protected]
223 views
CS555Topic 241 Cryptography CS 555 Topic 24: Secure Function Evaluation
232 views
An brief tour of Differential Privacy Avrim Blum Computer Science Dept Your guide:
216 views
ITIS 6167/8167: Network and Information Security Weichao Wang
223 views
Survey: Secure Composition of Multiparty Protocols Yehuda Lindell IBM T.J. Watson
216 views
Tutorial on Secure Multi-Party Computation Yehuda Lindell IBM T.J.Watson
250 views
Rafael Pass Cornell University Constant-round Non-malleability From Any One-way Function Joint work with Huijia (Rachel) Lin
214 views
Information-Theoretic Security and Security under Composition Eyal Kushilevitz (Technion) Yehuda Lindell (Bar-Ilan University) Tal Rabin (IBM T.J. Watson)
215 views
Next >