Breaking News!
60% Off the Hottest Halloween Costumes & Accessories

Engineering Secure Two-Party Computation Protocols

Best Price (Coupon Required):
Buy Engineering Secure Two-Party Computation Protocols for $89.10 at @ Link.springer.com when you apply the 10% OFF coupon at checkout.
Click “Get Coupon & Buy” to copy the code and unlock the deal.

Set a price drop alert to never miss an offer.

1 Offer Price Range: $99.00 - $99.00
BEST PRICE

Single Product Purchase

$89.10
@ Link.springer.com with extra coupon

Price Comparison

Seller Contact Seller List Price On Sale Shipping Best Promo Final Price Volume Discount Financing Availability Seller's Page
BEST PRICE
1 Product Purchase
@ Link.springer.com
$99.00 $99.00

10% OFF
This deals requires coupon
$89.10
See Site In stock Visit Store

Product Details

Brand
Springer Nature
Manufacturer
N/A
Part Number
0
GTIN
9783642300424
Condition
New
Product Description

Secure two-party computation, called secure function evaluation (SFE), enables two mutually mistrusting parties, the client and server, to evaluate an arbitrary function on their respective private inputs while revealing nothing but the result. Originally the technique was considered to be too inefficient for practical privacy-preserving applications, but in recent years rapid speed-up in computers and communication networks, algorithmic improvements, automatic generation, and optimizations have enabled their application in many scenarios. The author offers an extensive overview of the most practical and efficient modern techniques used in the design and implementation of secure computation and related protocols. After an introduction that sets secure computation in its larger context of other privacy-enhancing technologies such as secure channels and trusted computing, he covers the basics of practically efficient secure function evaluation, circuit optimizations and constructions, hardware-assisted garbled circuit protocols, and the modular design of efficient SFE protocols. The goal of the author's research is to use algorithm engineering methods to engineer efficient secure protocols, both as a generic tool and for solving practical applications, and he achieves an excellent balance between the theory and applicability. The book is essential for researchers, students and practitioners in the area of applied cryptography and information security who aim to construct practical cryptographic protocols for privacy-preserving real-world applications.

Available Colors
Available Sizes

Reviews

0
0 reviews
5 stars
4 stars
3 stars
2 stars
1 star

Questions & Answers

Similar Products

GABAB Receptor

GABAB Receptor

$169.00
The Palgrave Companion to LSE Economics

The Palgrave Companion to LSE Economics

$329.99
Recent Advances in Constraints

Recent Advances in Constraints

$54.99
Genforschung und Gentechnik

Genforschung und Gentechnik

$54.99
Judy Moody Was in a Mood

Judy Moody Was in a Mood

$4.46
Mycobacterial Skin Diseases

Mycobacterial Skin Diseases

$129.00
Health Reforms in Post-Communist Eastern Europe

Health Reforms in Post-Communist Eastern Europe

$89.00
Locality in WH Quantification

Locality in WH Quantification

$109.99
The Tea Plant Genome

The Tea Plant Genome

$279.99
Dragon Girls #5: Aisha the Sapphire Treasure Dragon

Dragon Girls #5: Aisha the Sapphire Treasure Dragon

$4.49
Civil Society and Governance in China

Civil Society and Governance in China

$39.99
Aquinas's Philosophy of Religion

Aquinas's Philosophy of Religion

$54.99
Environmental Challenges in the Mediterranean 20002050

Environmental Challenges in the Mediterranean 20002050

$219.99
Funktionale und Applikative Programmierung

Funktionale und Applikative Programmierung

$49.99
Global Communication Governance at the Crossroads

Global Communication Governance at the Crossroads

$159.99
Countering Cyberterrorism

Countering Cyberterrorism

$199.99
The Pout-Pout Fish

The Pout-Pout Fish

$5.96
Edible Films and Coatings for Food Applications

Edible Films and Coatings for Food Applications

$109.99
Possibility of the Aesthetic Experience

Possibility of the Aesthetic Experience

$109.99
Jingle

Jingle

$6.74
The Ocean Basins and Margins

The Ocean Basins and Margins

$84.99
Steroidhormone

Steroidhormone

$84.99
Harry Potter-Illustrated: Quidditch Through the Ages (Hardcover)

Harry Potter-Illustrated: Quidditch Through the Ages (Hardcover)

$26.24
Optical Guided-wave Chemical and Biosensors I

Optical Guided-wave Chemical and Biosensors I

$129.00
Nondestructive Characterization of Materials II

Nondestructive Characterization of Materials II

$54.99
Self-Tracking

Self-Tracking

$49.99
Vegetation, Water, Humans and the Climate

Vegetation, Water, Humans and the Climate

$84.99
Women and the Media in Jordan

Women and the Media in Jordan

$59.99
Advances in Carbon Capture and Utilization

Advances in Carbon Capture and Utilization

$159.99
Advances in Visual Computing

Advances in Visual Computing

$89.99
Einfhrung in die organisch-chemische Laboratoriumstechnik

Einfhrung in die organisch-chemische Laboratoriumstechnik

$44.99
Quantum Interaction

Quantum Interaction

$54.99
Entwicklung organisationalen Lernens

Entwicklung organisationalen Lernens

$64.99
Digital Movement

Digital Movement

$139.99
The Washington, DC Media Corps in the 21st Century

The Washington, DC Media Corps in the 21st Century

$39.99
Sensitivity Analysis for Neural Networks

Sensitivity Analysis for Neural Networks

$84.99
Entwicklungspfade und Meilensteine moderner Logistik

Entwicklungspfade und Meilensteine moderner Logistik

$79.99
Zweiter Internationaler Kongre fr Histo- und Cytochemie / Second International Congress of Histo

Zweiter Internationaler Kongre fr Histo- und Cytochemie / Second International Congress of Histo

$44.99
Klimawirksame Kennzahlen fr Amerika

Klimawirksame Kennzahlen fr Amerika

$17.99
previous
next