22 results
7 - Cryptographic MPC Protocols
- from Part I - Secure Multiparty Computation
-
- Book:
- Secure Multiparty Computation and Secret Sharing
- Published online:
- 05 August 2015
- Print publication:
- 15 July 2015, pp 159-162
-
- Chapter
- Export citation
5 - Information-Theoretic Robust MPC Protocols
- from Part I - Secure Multiparty Computation
-
- Book:
- Secure Multiparty Computation and Secret Sharing
- Published online:
- 05 August 2015
- Print publication:
- 15 July 2015, pp 104-138
-
- Chapter
- Export citation
1 - Introduction
- from Part I - Secure Multiparty Computation
-
- Book:
- Secure Multiparty Computation and Secret Sharing
- Published online:
- 05 August 2015
- Print publication:
- 15 July 2015, pp 3-13
-
- Chapter
- Export citation
6 - MPC from General Linear Secret-Sharing Schemes
- from Part I - Secure Multiparty Computation
-
- Book:
- Secure Multiparty Computation and Secret Sharing
- Published online:
- 05 August 2015
- Print publication:
- 15 July 2015, pp 139-158
-
- Chapter
- Export citation
2 - Preliminaries
- from Part I - Secure Multiparty Computation
-
- Book:
- Secure Multiparty Computation and Secret Sharing
- Published online:
- 05 August 2015
- Print publication:
- 15 July 2015, pp 14-31
-
- Chapter
- Export citation
10 - Algebraic Preliminaries
- from Part II - Secret Sharing
-
- Book:
- Secure Multiparty Computation and Secret Sharing
- Published online:
- 05 August 2015
- Print publication:
- 15 July 2015, pp 203-235
-
- Chapter
- Export citation
Index
-
- Book:
- Secure Multiparty Computation and Secret Sharing
- Published online:
- 05 August 2015
- Print publication:
- 15 July 2015, pp 369-373
-
- Chapter
- Export citation
9 - Applications of MPC
- from Part I - Secure Multiparty Computation
-
- Book:
- Secure Multiparty Computation and Secret Sharing
- Published online:
- 05 August 2015
- Print publication:
- 15 July 2015, pp 182-200
-
- Chapter
- Export citation
3 - MPC Protocols with Passive Security
- from Part I - Secure Multiparty Computation
-
- Book:
- Secure Multiparty Computation and Secret Sharing
- Published online:
- 05 August 2015
- Print publication:
- 15 July 2015, pp 32-50
-
- Chapter
- Export citation
List of Algorithms
-
- Book:
- Secure Multiparty Computation and Secret Sharing
- Published online:
- 05 August 2015
- Print publication:
- 15 July 2015, pp 355-356
-
- Chapter
- Export citation
11 - Secret Sharing
- from Part II - Secret Sharing
-
- Book:
- Secure Multiparty Computation and Secret Sharing
- Published online:
- 05 August 2015
- Print publication:
- 15 July 2015, pp 236-298
-
- Chapter
- Export citation
12 - Arithmetic Codices
- from Part II - Secret Sharing
-
- Book:
- Secure Multiparty Computation and Secret Sharing
- Published online:
- 05 August 2015
- Print publication:
- 15 July 2015, pp 299-354
-
- Chapter
- Export citation
Preface
-
- Book:
- Secure Multiparty Computation and Secret Sharing
- Published online:
- 05 August 2015
- Print publication:
- 15 July 2015, pp ix-x
-
- Chapter
- Export citation
References
-
- Book:
- Secure Multiparty Computation and Secret Sharing
- Published online:
- 05 August 2015
- Print publication:
- 15 July 2015, pp 359-368
-
- Chapter
- Export citation
Secure Multiparty Computation and Secret Sharing
-
- Published online:
- 05 August 2015
- Print publication:
- 15 July 2015
Part I - Secure Multiparty Computation
-
- Book:
- Secure Multiparty Computation and Secret Sharing
- Published online:
- 05 August 2015
- Print publication:
- 15 July 2015, pp 1-2
-
- Chapter
- Export citation
Part II - Secret Sharing
-
- Book:
- Secure Multiparty Computation and Secret Sharing
- Published online:
- 05 August 2015
- Print publication:
- 15 July 2015, pp 201-202
-
- Chapter
- Export citation
List of Exercises
-
- Book:
- Secure Multiparty Computation and Secret Sharing
- Published online:
- 05 August 2015
- Print publication:
- 15 July 2015, pp 357-358
-
- Chapter
- Export citation
4 - Models
- from Part I - Secure Multiparty Computation
-
- Book:
- Secure Multiparty Computation and Secret Sharing
- Published online:
- 05 August 2015
- Print publication:
- 15 July 2015, pp 51-103
-
- Chapter
- Export citation
Contents
-
- Book:
- Secure Multiparty Computation and Secret Sharing
- Published online:
- 05 August 2015
- Print publication:
- 15 July 2015, pp v-viii
-
- Chapter
- Export citation