Login / Signup

10-Party Sublinear Secure Computation from Standard Assumptions.

Geoffroy CouteauNaman Kumar
Published in: CRYPTO (9) (2024)
Keyphrases
  • efficient computation
  • multi party
  • artificial intelligence
  • machine learning
  • website
  • security analysis
  • identity management