×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [secure function evaluation]
Revisiting the efficiency of malicious two party computation David Woodruff MIT
218 views
Efficiency vs. Assumptions in Secure Computation Yuval Ishai Technion & UCLA
218 views
Completeness in Two-Party Secure Computation – A Computational View Danny Harnik Moni Naor Omer Reingold Alon Rosen Weizmann Institute of Science AT&T
217 views
How Should We Solve Search Problems Privately? Kobbi Nissim – BGU A. Beimel, T. Malkin, and E. Weinreb
218 views
Secure Computation of the k’th Ranked Element Gagan Aggarwal Stanford University Joint work with Nina Mishra and Benny Pinkas, HP Labs
216 views
Secure Computation of the k’th Ranked Element
26 views
Secure Computation of the k’th Ranked Element
25 views