sebaceous-gland 发表于 2025-3-28 17:48:44

http://reply.papertrans.cn/31/3031/303003/303003_41.png

Impugn 发表于 2025-3-28 21:18:32

The ,th-Ranked Elementsorted data sets in the presence of semi-honest and malicious adversaries. An important special case of this problem is that of securely computing the .. The construction of is based on the iterative protocol of for computing the .th-ranked element with low communication complexity. The sec

后天习得 发表于 2025-3-28 23:55:19

http://reply.papertrans.cn/31/3031/303003/303003_43.png

不能仁慈 发表于 2025-3-29 03:24:09

10楼

爱得痛了 发表于 2025-3-29 08:10:01

10楼
页: 1 2 3 4 [5]
查看完整版本: Titlebook: Efficient Secure Two-Party Protocols; Techniques and Const Carmit Hazay,Yehuda Lindell Book 2010 Springer-Verlag Berlin Heidelberg 2010 Cov