Sign in
Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries.
Yehuda Lindell
Published in:
IACR Cryptol. ePrint Arch. (2013)
Keyphrases
</>
semi honest
privacy preserving
information flow
privacy preserving data mining
multi party
data mining
authentication protocol
communication protocol
communication protocols
terrorist networks
key players
security protocols
cryptographic protocols
malicious code
detect malicious