Encrypting problem instances: Or ... can you take advantage of someone without having to trust him?

  • Authors:
  • Joan Feigenbaum

  • Affiliations:
  • -

  • Venue:
  • Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
  • Year:
  • 1986

Quantified Score

Hi-index 0.00

Visualization

Abstract