Login / Signup
Pseudonymous Secure Computation from Time-Lock Puzzles.
Jonathan Katz
Andrew Miller
Elaine Shi
Published in:
IACR Cryptol. ePrint Arch. (2014)
Keyphrases
</>
constraint satisfaction
efficient computation
real time
artificial intelligence
lightweight
database
data sets
data structure
security requirements