×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [real protocol]
ftp
822 views
A Two-Server Auction Scheme Ari Juels and Mike Szydlo Financial Cryptography 02 12 March 2002
217 views
Persistent Security for RFID
207 views
MATTHEW FRANKLIN PAYMAN MOHASSEL UC DAVIS U OF CALGARY Secure Evaluation of Multivariate Polynomials 1
218 views
0x1A Great Papers in Computer Security
27 views
Impossibility Results for Concurrent Two-Party Computation
26 views
Slide 1 Vitaly Shmatikov CS 380S Introduction to Secure Multi-Party Computation
215 views
Secure Computation (Lecture 5) Arpita Patra. Recap >> Scope of MPC > models of computation > network models > modelling distrust (centralized/decentralized
229 views
Oblivious Transfer based on the McEliece Assumptions
32 views
Oblivious Transfer based on the McEliece Assumptions Rafael Dowsley Jeroen van der Graaf Jörn Müller-Quade Anderson C. A. Nascimento University of Brasilia
218 views
A Two-Server Auction Scheme
36 views
Slide 1 Many thanks to Vitaly Shmatikov of the University of Texas, Austin for providing these slides. Introduction to Secure Multi-Party Computation
215 views
Next >