DMCA

How to Securely Outsource Cryptographic Computations

Cached

Download Links

by Susan Hohenberger , Anna Lysyanskaya
Venue:In Theory of Cryptography (2005
Citations:53 - 0 self