Login / Signup
A Zero-One Law for Deterministic 2-Party Secure Computation.
Hemanta K. Maji
Manoj Prabhakaran
Mike Rosulek
Published in:
IACR Cryptol. ePrint Arch. (2010)
Keyphrases
</>
multi party
information systems
security issues
password based authenticated key exchange
real time
lower bound
black box
neural network
reinforcement learning
access control
lightweight
security properties