Login / Signup
10-Party Sublinear Secure Computation from Standard Assumptions.
Geoffroy Couteau
Naman Kumar
Published in:
CRYPTO (9) (2024)
Keyphrases
</>
efficient computation
multi party
artificial intelligence
machine learning
website
security analysis
identity management