Login / Signup

Executable Proofs, Input-Size Hiding Secure Computation and a New Ideal World.

Melissa ChaseRafail OstrovskyIvan Visconti
Published in: EUROCRYPT (2) (2015)
Keyphrases
  • case study
  • theorem proving
  • maximum number
  • neural network
  • database systems
  • security requirements
  • mathematical proofs