Applying Secure Multiparty Computation Technology

Published: Dec. 6, 2018, 10 a.m.

b'Israel-based Yehuda Lindell, a cryptography professor, describes how to use secure multiparty computation technology to protect cryptographic keys and describes other potential security applications.'