Login / Signup
Constant-Round Maliciously Secure Two-Party Computation in the RAM Model.
Carmit Hazay
Avishay Yanai
Published in:
J. Cryptol. (2019)
Keyphrases
</>
computational model
mathematical model
cost function
objective function
probabilistic model
experimental data
formal model
data sets
high level
theoretical analysis
theoretical framework
social networks
data structure
management system
statistical model
security model