Theory of Cryptography
From MaRDI portal
Publication:5898372
DOI10.1007/11681878zbMath1112.94031OpenAlexW3149533473WikidataQ57254512 ScholiaQ57254512MaRDI QIDQ5898372
Publication date: 12 February 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11681878
Related Items (4)
Efficient set operations in the presence of malicious adversaries ⋮ A practical approach to the secure computation of the Moore-Penrose pseudoinverse over the rationals ⋮ Multiparty cardinality testing for threshold private intersection ⋮ Secure linear system computation in the presence of malicious adversaries
This page was built for publication: Theory of Cryptography