25
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Book Chapter: not found
      Theory of Cryptography 

      Distributed Oblivious RAM for Secure Two-Party Computation

      other
      ,
      Springer Berlin Heidelberg

      Read this book at

      Buy book Bookmark
          There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references27

          • Record: found
          • Abstract: not found
          • Article: not found

          Software protection and simulation on oblivious RAMs

            Bookmark
            • Record: found
            • Abstract: not found
            • Book: not found

            Foundations of Cryptography

              Bookmark
              • Record: found
              • Abstract: not found
              • Book Chapter: not found

              Founding Cryptography on Oblivious Transfer – Efficiently

                Bookmark

                Author and book information

                Book Chapter
                2013
                : 377-396
                10.1007/978-3-642-36594-2_22
                5a0959a2-876e-49d1-aedf-7e4f1c417f43
                History

                Comments

                Comment on this book

                Book chapters

                Similar content4,171

                Cited by14