Login / Signup

Fast Cut-and-Choose-Based Protocols for Malicious and Covert Adversaries.

Yehuda Lindell
Published in: J. Cryptol. (2016)
Keyphrases
  • semi honest
  • privacy preserving
  • privacy preserving data mining
  • malicious behavior
  • information flow
  • multi party
  • neural network
  • social networks
  • communication protocols
  • key players