Login / Signup
Perfect Secure Computation in Two Rounds.
Benny Applebaum
Zvika Brakerski
Rotem Tsabary
Published in:
IACR Cryptol. ePrint Arch. (2018)
Keyphrases
</>
database
data sets
efficient computation
data mining
artificial intelligence
search engine
evolutionary algorithm
operating system
security requirements
security analysis