How to Securely Outsource Cryptographic Computations

Cached

Download Links

by Susan Hohenberger , Anna Lysyanskaya
Venue:In Theory of Cryptography (2005
Citations:26 - 0 self