Login / Signup

Constant Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model.

Carmit HazayAntigoni PolychroniadouMuthuramakrishnan Venkitasubramaniam
Published in: Public Key Cryptography (2) (2017)
Keyphrases
  • probabilistic model
  • cost function
  • computational model
  • mathematical model
  • formal model
  • real time
  • image processing
  • low cost
  • statistical model
  • prior knowledge
  • digital images
  • experimental data
  • theorem proving