Login / Signup

Two-Round Maliciously Secure Computation with Super-Polynomial Simulation.

Amit AgarwalJames BartusekVipul GoyalDakshita KhuranaGiulio Malavolta
Published in: TCC (1) (2021)
Keyphrases
  • mathematical model
  • simulation model
  • database
  • simulation study
  • data sets
  • information retrieval
  • genetic algorithm
  • case study
  • mathematical models
  • efficient computation
  • simulation models