Amanote Research

Amanote Research

    RegisterSign In

Secure Two-Party Computation Over Unreliable Channels

Lecture Notes in Computer Science - Germany
doi 10.1007/978-3-319-98113-0_24
Full Text
Open PDF
Abstract

Available in full text

Categories
Computer ScienceTheoretical Computer Science
Date

January 1, 2018

Authors
Ran GellesAnat Paskin-CherniavskyVassilis Zikas
Publisher

Springer International Publishing


Related search

Efficiently Making Secure Two-Party Computation Fair

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2017English

Faster Secure Two-Party Computation With Less Memory

2013English

Efficient Secure Two-Party Computation Against Malicious Adversaries

English

Hiding the Input-Size in Secure Two-Party Computation

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2013English

Towards Characterizing Complete Fairness in Secure Two-Party Computation

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2014English

Fast and Maliciously Secure Two-Party Computation Using the GPU

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2013English

The All-Or-Nothing Nature of Two-Party Secure Computation

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
1999English

Span Programs and General Secure Multi-Party Computation

BRICS Report Series
1997English

Privacy-Aware MapReduce Based Multi-Party Secure Skyline Computation

Information (Switzerland)
Information Systems
2019English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy