Login / Signup
Actively Secure Two-Party Evaluation of any Quantum Operation.
Frédéric Dupuis
Jesper Buus Nielsen
Louis Salvail
Published in:
IACR Cryptol. ePrint Arch. (2012)
Keyphrases
</>
active learning
real time
neural network
data mining
wireless sensor networks
distributed systems
evaluation measures
evaluation method
evaluation criteria
cryptographic protocols