Secure computation from millionaire
From MaRDI portal
Publication:2811153
Recommendations
Cited in
(7)- Theory of Cryptography
- Secure computation of the median (and other elements of specified ranks)
- Secure computation of the \(k^{\text{th}}\)-ranked element in a star network
- Scalable multi-party private set-intersection
- Secure computation on the web: computing without simultaneous interaction
- Information Security and Cryptology
- Advances in Cryptology - EUROCRYPT 2004
This page was built for publication: Secure computation from millionaire
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2811153)