free tracker
Categories Unlimited Books

Composition of Secure Multi-Party Protocols: A Comprehensive Study (Lecture…



Composition of Secure Multi-party Protocols In the setting of multi-party computation, sets of two or more parties with private inputs wish to jointly compute some (predetermined) function of their inputs. General results concerning secure two-party or multi-party computation were first announced in the 1980s. Put briefly, these results assert that under certain assumptions one can construct protocols for securely computing any desired mult… Full description


Composition Of Secure Multi Party Protocols

Pub Date : 2003-09-08 | Author : Yehuda Lindell | Publisher : Springer Science & Business Media

ISBN 10 : 9783540201052
ISBN 13 : 354020105X

In the setting of multi-party computation, sets of two or more parties with private inputs wish to jointly compute some (predetermined) function of their inputs. General results co..


Attacking Africa S Poverty

Pub Date : 2006 | Author : M. Louise Fox | Publisher : World Bank Publications

ISBN 10 : 9780821363232
ISBN 13 : 0821363239

By all measures, poverty in Africa as a whole has increased and deepened. But in fact, Africa contains a number of undocumented success stories of poverty reduction. This book pres..


Slovenia

Pub Date : 2004-01-01 | Author : Mojmir Mrak | Publisher : World Bank Publications

ISBN 10 : 0821357182
ISBN 13 : 9780821357187

Thirteen years after independence from the former Socialist Republic of Yugoslavia, Slovenia has become one of the most advanced transition economies in Central and Eastern Europe ..



Applied Quantum Cryptography

Pub Date : 2010-04-05 | Author : Christian Kollmitzer | Publisher : Springer

ISBN 10 : 9783642048319
ISBN 13 : 3642048315

Using the quantum properties of single photons to exchange binary keys between two partners for subsequent encryption of secret data is an absolutely novel te- nology. Only a few y..


Quantum Attacks On Public Key Cryptosystems

Pub Date : 2014-07-08 | Author : Song Y. Yan | Publisher : Springer Science & Business Media

ISBN 10 : 9781441977229
ISBN 13 : 1441977228

The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially t..


Applied Cryptography

Pub Date : 2017-05-25 | Author : Bruce Schneier | Publisher : John Wiley & Sons

ISBN 10 : 9781119439028
ISBN 13 : 1119439027

From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the semin..


Leave a Reply

Your email address will not be published. Required fields are marked *