Efficient Secure Two-Party Protocols: Techniques and Constructions (Information Security and Cryptography)

Information Security and Cryptography Texts and Monographs Series Editors David Basin Ueli Maurer Advisory Board Martín...
Author:  Carmit Hazay |  Yehuda Lindell

10 downloads 574 Views 2MB Size Report

This content was uploaded by our users and we assume good faith they have the permission to share this book. If you own the copyright to this book and it is wrongfully on our website, we offer a simple DMCA procedure to remove your content from our site. Start by pressing the button below!

Report copyright / DMCA form

Recommend Documents

COMPUTER SECURITY AND CRYPTOGRAPHY ALAN G. KONHEIM COMPUTER SECURITY AND CRYPTOGRAPHY COMPUTER SECURITY AND CRYPTOG...

COMPUTER SECURITY AND CRYPTOGRAPHY ALAN G. KONHEIM COMPUTER SECURITY AND CRYPTOGRAPHY COMPUTER SECURITY AND CRYPTOG...

Efficient and Secure Source Authentication for Multicast Adrian Perrigy y Ran Canettiz Dawn Songy J. D. Tygary UC B...

Information Security and Cryptography Texts and Monographs Series Editors David Basin Ueli Maurer Advisory Board Martín...

Encyclopedia of Cryptography and Security Henk C.A. van Tilborg ⋅ Sushil Jajodia (Eds.) Encyclopedia of Cryptography...

Encyclopedia of Cryptography and Security Henk C.A. van Tilborg ⋅ Sushil Jajodia (Eds.) Encyclopedia of Cryptography...

ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY i ii ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY Editor-in-chief Henk C.A...

Encyclopedia of Cryptography and Security Henk C.A. van Tilborg ⋅ Sushil Jajodia (Eds.) Encyclopedia of Cryptography...

ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY i ii ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY Editor-in-chief Henk C.A...