The following pages link to Theory of Cryptography (Q5898372):
Displaying 4 items.
- Efficient set operations in the presence of malicious adversaries (Q434343) (← links)
- Multiparty cardinality testing for threshold private intersection (Q2061947) (← links)
- A practical approach to the secure computation of the Moore-Penrose pseudoinverse over the rationals (Q2229288) (← links)
- Secure linear system computation in the presence of malicious adversaries (Q2335946) (← links)