Login / Signup
Two-Round Concurrently Secure Two-Party Computation.
Behzad Abdolmaleki
Giulio Malavolta
Ahmadreza Rahimi
Published in:
IACR Cryptol. ePrint Arch. (2021)
Keyphrases
</>
key agreement protocol
efficient computation
block cipher
case study
dot product