C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
Perfect Secure Computation in Two Rounds.
Benny Applebaum
Zvika Brakerski
Rotem Tsabary
Published in:
IACR Cryptol. ePrint Arch. (2018)
Keyphrases
</>
database
data sets
efficient computation
data mining
artificial intelligence
search engine
evolutionary algorithm
operating system
security requirements
security analysis