Login / Signup

Non-Interactive Secure Computation Based on Cut-and-Choose.

Arash AfsharPayman MohasselBenny PinkasBen Riva
Published in: EUROCRYPT (2014)
Keyphrases
  • virtual reality
  • data sets
  • data mining
  • social networks
  • video sequences
  • user interaction
  • security issues
  • security requirements
  • covert channel