Login / Signup
Two-Output Secure Computation with Malicious Adversaries.
Abhi Shelat
Chih-Hao Shen
Published in:
IACR Cryptol. ePrint Arch. (2011)
Keyphrases
</>
security requirements
efficient computation
security issues
malicious attacks
semi honest
decision making