Login / Signup
Secure Computation from Leaky Correlated Randomness.
Divya Gupta
Yuval Ishai
Hemanta K. Maji
Amit Sahai
Published in:
CRYPTO (2) (2015)
Keyphrases
</>
machine learning
key management
database
real time
information retrieval
operating system
authentication scheme