Efficient Secure Two-Party Protocols More Books Like This

Contemporary Cryptology Contemporary Cryptology
2006
Secure Multi-Party Computation Against Passive Adversaries Secure Multi-Party Computation Against Passive Adversaries
2022
Theory of Cryptography Theory of Cryptography
2009
Theory of Cryptography Theory of Cryptography
2010
Theory of Cryptography Theory of Cryptography
2022
Practical Mathematical Cryptography Practical Mathematical Cryptography
2022
Advances in Cryptology – CRYPTO 2022 Advances in Cryptology – CRYPTO 2022
2022
Advances in Cryptology – EUROCRYPT 2023 Advances in Cryptology – EUROCRYPT 2023
2023
Advances in Cryptology – ASIACRYPT 2020 Advances in Cryptology – ASIACRYPT 2020
2020
Theory of Cryptography Theory of Cryptography
2022
Advances in Cryptology – ASIACRYPT 2021 Advances in Cryptology – ASIACRYPT 2021
2021
Advances in Cryptology – EUROCRYPT 2022 Advances in Cryptology – EUROCRYPT 2022
2022
Advances in Cryptology – CRYPTO 2022 Advances in Cryptology – CRYPTO 2022
2022
Advances in Cryptology – EUROCRYPT 2019 Advances in Cryptology – EUROCRYPT 2019
2019
Advances in Cryptology – CRYPTO 2021 Advances in Cryptology – CRYPTO 2021
2021