Login / Signup

Secure Computation from Leaky Correlated Randomness.

Divya GuptaYuval IshaiHemanta K. MajiAmit Sahai
Published in: CRYPTO (2) (2015)
Keyphrases
  • machine learning
  • key management
  • database
  • real time
  • information retrieval
  • operating system
  • authentication scheme