Login / Signup
Constant-Round Maliciously Secure Two-Party Computation in the RAM Model.
Carmit Hazay
Avishay Yanai
Published in:
TCC (B1) (2016)
Keyphrases
</>
statistical model
computational model
formal model
high level
probability distribution
management system
mathematical model
simulation model
prediction model
web services
objective function
theoretical analysis
theoretical framework
experimental data