Login / Signup
Multiparty computation secure against continual memory leakage.
Elette Boyle
Shafi Goldwasser
Abhishek Jain
Yael Tauman Kalai
Published in:
STOC (2012)
Keyphrases
</>
multi party
privacy preserving
secret sharing
secure multi party
audio video
memory requirements
turn taking
case study
search algorithm
mental states
description language
human communication
random access
computational intelligence