Theory of Cryptography
From MaRDI portal
Publication:5898372
DOI10.1007/11681878zbMath1112.94031WikidataQ57254512 ScholiaQ57254512MaRDI QIDQ5898372
Publication date: 12 February 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11681878
94A62: Authentication, digital signatures and secret sharing
Related Items
Efficient set operations in the presence of malicious adversaries, Multiparty cardinality testing for threshold private intersection, A practical approach to the secure computation of the Moore-Penrose pseudoinverse over the rationals, Secure linear system computation in the presence of malicious adversaries