Login / Signup
Efficiency Tradeoffs for Malicious Two-Party Computation.
Payman Mohassel
Matthew K. Franklin
Published in:
Public Key Cryptography (2006)
Keyphrases
</>
case study
computational complexity
digital libraries
data sets
neural network
artificial intelligence
computer vision
information systems
feature selection
hidden markov models
high efficiency
parallel computation