Login / Signup
Secure Computation from Elastic Noisy Channels.
Dakshita Khurana
Hemanta K. Maji
Amit Sahai
Published in:
IACR Cryptol. ePrint Arch. (2016)
Keyphrases
</>
efficient computation
lightweight
noisy data
key management
identity management
security requirements
standard model