Login / Signup
Constant Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model.
Carmit Hazay
Antigoni Polychroniadou
Muthuramakrishnan Venkitasubramaniam
Published in:
IACR Cryptol. ePrint Arch. (2017)
Keyphrases
</>
mathematical model
real time
management system
probability distribution
computational model
experimental data
similarity measure
probabilistic model
privacy preserving
formal model