Login / Signup

Secure computation with information leaking to an adversary.

Miklós Ajtai
Published in: STOC (2011)
Keyphrases