Login / Signup
Secure Two-party Computation Approach for NTRUEncrypt.
Lin You
Yan Wang
Liang Li
Gengran Hu
Published in:
IACR Cryptol. ePrint Arch. (2022)
Keyphrases
</>
key agreement protocol
record linkage
key management
authentication scheme
database
data sets
decision trees
case study
user authentication