Encryption.- Memory Protection.- Multi-party Computation.- Zero-knowledge Proofs.- Efficient Protocols.- Outsourcing Computation.- Digital Signatures.- Cryptanalysis.- Two-party Computation.- Secret Sharing.- Obfuscation.
Encryption.- Memory Protection.- Multi-party Computation.- Zero-knowledge Proofs.- Efficient Protocols.- Outsourcing Computation.- Digital Signatures.- Cryptanalysis.- Two-party Computation.- Secret Sharing.- Obfuscation.
This title is in stock with our Australian supplier and should arrive at our Sydney warehouse within 1 - 2 weeks of you placing an order.
Once received into our warehouse we will despatch it to you with a Shipping Notification which includes online tracking.
Please check the estimated delivery times below for your region, for after your order is despatched from our warehouse:
Share This Book: