Login / Signup
Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation.
Xiao Wang
Samuel Ranellucci
Jonathan Katz
Published in:
CCS (2017)
Keyphrases
</>
key agreement protocol
authentication scheme
key exchange protocol
website
lightweight
cost efficient
key exchange
neural network
wireless sensor networks
computationally expensive
efficient computation
standard model
cryptographic protocols
provably secure