Login / Signup
Efficient and Provable Security Amplifications.
Ronald Cramer
Ivan Damgård
Torben P. Pedersen
Published in:
Security Protocols Workshop (1996)
Keyphrases
</>
computationally expensive
case study
low cost
lightweight
intrusion detection
security mechanisms
security protocols
data sets
neural network
data mining
computationally efficient
privacy preserving
computer security
elliptic curve
provably secure