Login / Signup
Secure Two-Party Computation via Leaky Generalized Oblivious Transfer.
Samuel Ranellucci
Alain Tapp
Published in:
IACR Cryptol. ePrint Arch. (2013)
Keyphrases
</>
database
genetic algorithm
website
privacy preserving
efficient computation
authentication protocol
key agreement protocol