Login / Signup

Constant-Round Maliciously Secure Two-Party Computation in the RAM Model.

Carmit HazayAvishay Yanai
Published in: J. Cryptol. (2019)
Keyphrases