Login / Signup
Secure Two-Party Computation with Reusable Bit-Commitments, via a Cut-and-Choose with Forge-and-Lose Technique.
Luís T. A. N. Brandão
Published in:
IACR Cryptol. ePrint Arch. (2013)
Keyphrases
</>
key agreement protocol
block cipher
neural network
software systems
image segmentation
multiagent systems
software architecture
security requirements
key management
group communication
protection scheme
advanced encryption standard