Login / Signup

Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries.

Yehuda Lindell
Published in: CRYPTO (2) (2013)
Keyphrases