Sign in

More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries.

Gilad AsharovYehuda LindellThomas SchneiderMichael Zohner
Published in: EUROCRYPT (1) (2015)
Keyphrases
  • information security
  • access control
  • malicious attacks
  • data sets
  • cost effective
  • computationally expensive
  • network security
  • security issues
  • computer security