Login / Signup

Constant-Round Maliciously Secure Two-Party Computation in the RAM Model.

Carmit HazayAvishay Yanai
Published in: TCC (B1) (2016)
Keyphrases