Sign in

On the Power of Correlated Randomness in Secure Computation.

Yuval IshaiEyal KushilevitzSigurd MeldgaardClaudio OrlandiAnat Paskin-Cherniavsky
Published in: TCC (2013)
Keyphrases
  • database
  • power consumption
  • security analysis
  • data sets
  • artificial intelligence
  • efficient computation
  • real time
  • social networks
  • case study
  • lightweight
  • security requirements