Amanote Research

Amanote Research

    RegisterSign In

Efficiently Making Secure Two-Party Computation Fair

Lecture Notes in Computer Science - Germany
doi 10.1007/978-3-662-54970-4_11
Full Text
Open PDF
Abstract

Available in full text

Categories
Computer ScienceTheoretical Computer Science
Date

January 1, 2017

Authors
Handan KılınçAlptekin Küpçü
Publisher

Springer Berlin Heidelberg


Related search

Secure Two-Party Computation Over Unreliable Channels

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2018English

Faster Secure Two-Party Computation With Less Memory

2013English

Efficient Secure Two-Party Computation Against Malicious Adversaries

English

Hiding the Input-Size in Secure Two-Party Computation

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2013English

Towards Characterizing Complete Fairness in Secure Two-Party Computation

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2014English

Fast and Maliciously Secure Two-Party Computation Using the GPU

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2013English

The All-Or-Nothing Nature of Two-Party Secure Computation

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
1999English

Span Programs and General Secure Multi-Party Computation

BRICS Report Series
1997English

Privacy-Aware MapReduce Based Multi-Party Secure Skyline Computation

Information (Switzerland)
Information Systems
2019English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy