×

Found 10 Documents (Results 1–10)

Implementing information-theoretically secure oblivious transfer from packet reordering. (English) Zbl 1365.94453

Kim, Howon (ed.), Information security and cryptology – ICISC 2011. 14th international conference, Seoul, Korea, November 30–December 2, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-31911-2/pbk). Lecture Notes in Computer Science 7259, 332-345 (2012).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI Link

Filter Results by …

Document Type

all top 3

Main Field

Software