Login / Signup
Two-Round Maliciously Secure Computation with Super-Polynomial Simulation.
Amit Agarwal
James Bartusek
Vipul Goyal
Dakshita Khurana
Giulio Malavolta
Published in:
TCC (1) (2021)
Keyphrases
</>
mathematical model
simulation model
database
simulation study
data sets
information retrieval
genetic algorithm
case study
mathematical models
efficient computation
simulation models