Login / Signup
Round-Optimal Black-Box Secure Computation from Two-Round Malicious OT.
Yuval Ishai
Dakshita Khurana
Amit Sahai
Akshayaram Srinivasan
Published in:
IACR Cryptol. ePrint Arch. (2022)
Keyphrases
</>
black box
white box
black boxes
block cipher
test cases
rule extraction
optimal solution
dynamic programming
state transition
white box testing
artificial intelligence
hybrid systems
integration testing
computational intelligence
key management