NPTEL Video Course : NOC:Secure Computation - Part II
Lecture 5 - EIG Protocol for Perfectly-Secure Byzantine Agreement: Analysis - Part I
Home
Previous
Next
Thumbnails