Login / Signup

An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries.

Yehuda LindellBenny Pinkas
Published in: J. Cryptol. (2015)
Keyphrases