Login / Signup
Fast Cut-and-Choose-Based Protocols for Malicious and Covert Adversaries.
Yehuda Lindell
Published in:
J. Cryptol. (2016)
Keyphrases
</>
semi honest
privacy preserving
privacy preserving data mining
malicious behavior
information flow
multi party
neural network
social networks
communication protocols
key players