Sciweavers

Share
TCC   2009 Theory of Cryptography Conference
Wall of Fame | Most Viewed TCC-2009 Paper
TCC
2009
Springer
255views Cryptology» more  TCC 2009»
9 years 9 months ago
LEGO for Two-Party Secure Computation
The first and still most popular solution for secure two-party computation relies on Yao's garbled circuits. Unfortunately, Yao's construction provide security only again...
Jesper Buus Nielsen, Claudio Orlandi
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
IdReadViewsTitleStatus
1Download preprint from source255
2Download preprint from source184
3Download preprint from source177
4Download preprint from source169
5Download preprint from source167
6Download preprint from source160
7Download preprint from source158
8Download preprint from source154
9Download preprint from source153
10Download preprint from source151
11Download preprint from source146
12Download preprint from source142
13Download preprint from source141
14Download preprint from source141
15Download preprint from source133
16Download preprint from source132
17Download preprint from source131
18Download preprint from source131
19Download preprint from source130
20Download preprint from source130
21Download preprint from source124
22Download preprint from source123
23Download preprint from source122
24Download preprint from source117
25Download preprint from source116
26Download preprint from source114
27Download preprint from source112
28Download preprint from source112
books