Login / Signup

Round-Optimal Secure Two-Party Computation from Trapdoor Permutations.

Michele CiampiRafail OstrovskyLuisa SiniscalchiIvan Visconti
Published in: TCC (1) (2017)
Keyphrases