Login / Signup
Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer.
Yehuda Lindell
Benny Pinkas
Published in:
IACR Cryptol. ePrint Arch. (2010)
Keyphrases
</>
transfer learning
knowledge transfer
information systems
lower bound
security analysis
diffie hellman