Sign in

Better Security-Efficiency Trade-Offs in Permutation-Based Two-Party Computation.

Yu Long ChenStefano Tessaro
Published in: ASIACRYPT (2) (2021)
Keyphrases