Login / Signup
Four Round Secure Computation without Setup.
Zvika Brakerski
Shai Halevi
Antigoni Polychroniadou
Published in:
IACR Cryptol. ePrint Arch. (2017)
Keyphrases
</>
security analysis
real time
data sets
information retrieval
computer vision
data structure
security issues
group communication
stream cipher