Foundations of secure interactive computing

D Beaver - Annual International Cryptology Conference, 1991 - Springer
The problem of secure multiparty computation is usually described as follows: each of n
players in a network holds a private input xi. Together they would like to compute a function …

Foundations of Secure Interactive Computing

D Beaver - Advances in Cryptology—CRYPTO'91 - infona.pl
The problem of secure multiparty computation is usually described as follows: each of n
players in a network holds a private input x i. Together they would like to compute a function …

Foundations of Secure Interactive Computing

D Beaver - Proceedings of the 11th Annual International …, 1991 - dl.acm.org
The problem of secure multiparty computation is usually described as follows: each of n
players in a network holds a private input xi. Together they would like to compute a function …

Foundations of Secure Interactive Computing

D Beaver - CRYPT0'91 - Springer
The problem of secure inulliparty computation is usually described as follows: each of 71
players in a network holds a private input I;. Together they would like to compute a function F …

Foundations of Secure Interactive Computing

D Beaver - Advances in Cryptology—CRYPTO'91: Proceedings, 2003 - books.google.com
The problem of secure multiparty computation is usually described as follows: each of n
players in a network holds a private input 2;. Together they would like to compute a function …

Foundations of Secure Interactive Computing

D Beaver - Lecture Notes in Computer Science (см. в книгах), 1992 - elibrary.ru
The problem of secure multiparty computation is usually described as follows: each of n
players in a network holds a private input xi ogether they would like to compute a function …

[引用][C] Foundations of secure interactive computing

D BEAVER - CRYPTO'91, 1991 - cir.nii.ac.jp

[PDF][PDF] Foundations of Secure Interactive Computing

D Beaver - researchgate.net
The problem of secure inulliparty computation is usually described as follows: each of 71
players in a network holds a private input I;. Together they would like to compute a function F …

[引用][C] Foundations of Secure Interactive Computing

D Beaver - Advances in Cryptology—CRYPTO'91, 1992 - Springer