Breaking News!
60% Off the Hottest Halloween Costumes & Accessories

Engineering Secure Two-Party Computation Protocols

Best Price (Coupon Required):
Buy Engineering Secure Two-Party Computation Protocols for $89.10 at @ Link.springer.com when you apply the 10% OFF coupon at checkout.
Click “Get Coupon & Buy” to copy the code and unlock the deal.

Set a price drop alert to never miss an offer.

1 Offer Price Range: $99.00 - $99.00
BEST PRICE

Single Product Purchase

$89.10
@ Link.springer.com with extra coupon

Price Comparison

Seller Contact Seller List Price On Sale Shipping Best Promo Final Price Volume Discount Financing Availability Seller's Page
BEST PRICE
1 Product Purchase
@ Link.springer.com
$99.00 $99.00

10% OFF
This deals requires coupon
$89.10
See Site In stock Visit Store

Product Details

Brand
Springer Nature
Manufacturer
N/A
Part Number
0
GTIN
9783642300424
Condition
New
Product Description

Secure two-party computation, called secure function evaluation (SFE), enables two mutually mistrusting parties, the client and server, to evaluate an arbitrary function on their respective private inputs while revealing nothing but the result. Originally the technique was considered to be too inefficient for practical privacy-preserving applications, but in recent years rapid speed-up in computers and communication networks, algorithmic improvements, automatic generation, and optimizations have enabled their application in many scenarios. The author offers an extensive overview of the most practical and efficient modern techniques used in the design and implementation of secure computation and related protocols. After an introduction that sets secure computation in its larger context of other privacy-enhancing technologies such as secure channels and trusted computing, he covers the basics of practically efficient secure function evaluation, circuit optimizations and constructions, hardware-assisted garbled circuit protocols, and the modular design of efficient SFE protocols. The goal of the author's research is to use algorithm engineering methods to engineer efficient secure protocols, both as a generic tool and for solving practical applications, and he achieves an excellent balance between the theory and applicability. The book is essential for researchers, students and practitioners in the area of applied cryptography and information security who aim to construct practical cryptographic protocols for privacy-preserving real-world applications.

Available Colors
Available Sizes

Reviews

0
0 reviews
5 stars
4 stars
3 stars
2 stars
1 star

Questions & Answers

Similar Products

Relevance of European Studies in Asia

Relevance of European Studies in Asia

$119.99
Computer Games

Computer Games

$54.99
Dabeisein und Dazugehren

Dabeisein und Dazugehren

$69.99
Die Kunst moderner Markenfhrung

Die Kunst moderner Markenfhrung

$49.99
Global Security, Safety, and Sustainability

Global Security, Safety, and Sustainability

$39.99
Molecular Motions in Liquids

Molecular Motions in Liquids

$39.99
A Primer on Fluid Mechanics with Applications

A Primer on Fluid Mechanics with Applications

$59.99
Medientraining fr Manager

Medientraining fr Manager

$59.99
Vergleichende Physiologie

Vergleichende Physiologie

$49.99
An Introduction to -Convergence

An Introduction to -Convergence

$149.00
Handbuch der Palliativpflege

Handbuch der Palliativpflege

$44.99
Age-Related Macular Degeneration

Age-Related Macular Degeneration

$169.99
The Biosynthesis of Secondary Metabolites

The Biosynthesis of Secondary Metabolites

$109.99
Star Maps

Star Maps

$59.99
Erneuerbare Energien und Wettbewerb in der Elektrizittswirtschaft

Erneuerbare Energien und Wettbewerb in der Elektrizittswirtschaft

$109.00
Screening the Dark Side of Love

Screening the Dark Side of Love

$39.99
Foucault/Paul

Foucault/Paul

$39.99
Adaptive Learning Environments

Adaptive Learning Environments

$84.99
Gear Accuracy

Gear Accuracy

$199.99
Foundations of Quantum Mechanics and Ordered Linear Spaces

Foundations of Quantum Mechanics and Ordered Linear Spaces

$39.99
Granular Computing: At the Junction of Rough Sets and Fuzzy Sets

Granular Computing: At the Junction of Rough Sets and Fuzzy Sets

$129.00
Metabolomics Tools for Natural Product Discovery

Metabolomics Tools for Natural Product Discovery

$169.99
Extraordinary Disorders of Human Behavior

Extraordinary Disorders of Human Behavior

$109.99
Epigenetics, Development, Ecology and Evolution

Epigenetics, Development, Ecology and Evolution

$129.00
Chinese Narratologies

Chinese Narratologies

$109.99
The Impact of Space Science on Mankind

The Impact of Space Science on Mankind

$54.99
The Economics of Brexit

The Economics of Brexit

$34.99
Nerve-Muscle Interaction

Nerve-Muscle Interaction

$169.99
New Concepts on Abdominoplasty and Further Applications

New Concepts on Abdominoplasty and Further Applications

$199.99
Pro Android Games

Pro Android Games

$39.99
Aggregation Functions in Theory and in Practice

Aggregation Functions in Theory and in Practice

$169.99
Dictionary of the European Economic Community

Dictionary of the European Economic Community

$74.99
Advanced Parallel Processing Technologies

Advanced Parallel Processing Technologies

$79.99
The Ankle in Football

The Ankle in Football

$169.99
Expert F# 2.0

Expert F# 2.0

$54.99
Tools for High Performance Computing 2018 / 2019

Tools for High Performance Computing 2018 / 2019

$109.99
Neurogenetik

Neurogenetik

$59.99
Japan and the Third World

Japan and the Third World

$39.99
The Kinetochore:

The Kinetochore:

$109.99
Ensuring Quality in Professional Education Volume I

Ensuring Quality in Professional Education Volume I

$84.99
previous
next