How to Ask Someone Out Eric Price. Just Do It Get her alone.
Compositional Protocol Logic
Identification and Authentication 1 CHAPTER 10: Identification and Authentication, Secret sharing and E-commerce applications Most of today's applications.
Oblivious Transfer based on the McEliece Assumptions
Oblivious Transfer based on the McEliece Assumptions Rafael Dowsley Jeroen van der Graaf Jörn Müller-Quade Anderson C. A. Nascimento University of Brasilia.