Login / Signup
Separating Two-Round Secure Computation from Oblivious Transfer.
Benny Applebaum
Zvika Brakerski
Sanjam Garg
Yuval Ishai
Akshayaram Srinivasan
Published in:
IACR Cryptol. ePrint Arch. (2020)
Keyphrases
</>
databases
machine learning
efficient computation
security protocols
block cipher
data sets
data mining
genetic algorithm
social networks
image sequences