Login / Signup
Hiding the Input-Size in Secure Two-Party Computation.
Yehuda Lindell
Kobbi Nissim
Claudio Orlandi
Published in:
IACR Cryptol. ePrint Arch. (2012)
Keyphrases
</>
security issues
neural network
input data
lightweight
efficient computation
web services
computational complexity
artificial neural networks