Login / Signup
Constant-Round Maliciously Secure Two-Party Computation in the RAM Model.
Carmit Hazay
Avishay Yanai
Published in:
IACR Cryptol. ePrint Arch. (2016)
Keyphrases
</>
probabilistic model
computational model
high level
statistical model
security model
prior knowledge
formal model
neural network model
probability distribution
theoretical analysis
management system
experimental data
input data
neural network
hidden markov models
cost function
information systems