Login / Signup

On Secure Two-Party Computation in Three Rounds.

Prabhanjan AnanthAbhishek Jain
Published in: TCC (1) (2017)
Keyphrases
  • key agreement protocol
  • database
  • efficient computation
  • security level
  • security analysis
  • standard model