Login / Signup

Universally Composable Secure Computation with Corrupted Tokens.

Nishanth ChandranWutichai ChongchitmateRafail OstrovskyIvan Visconti
Published in: CRYPTO (3) (2019)
Keyphrases
  • database
  • security issues
  • line segments
  • efficient computation
  • standard model
  • neural network
  • data mining
  • artificial intelligence
  • website