Login / Signup
Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries.
Yehuda Lindell
Published in:
CRYPTO (2) (2013)
Keyphrases
</>
semi honest
privacy preserving
information flow
multi party
privacy preserving data mining
real time
distributed databases
security protocols
neural network
database systems
communication protocol
cryptographic protocols
malicious attacks
malicious code
detect malicious