Full Description
This book provides an introduction to secret sharing, a key technology for practical applications and higher-level cryptographic protocols.
This book provides an introduction to secret sharing, a key technology for practical applications and higher-level cryptographic protocols.