Login / Signup
Round-Optimal Black-Box Secure Computation from Two-Round Malicious OT.
Yuval Ishai
Dakshita Khurana
Amit Sahai
Akshayaram Srinivasan
Published in:
TCC (2) (2022)
Keyphrases
</>
black box
block cipher
black boxes
white box
test cases
hybrid systems
integration testing
dynamic programming
rule extraction
decision trees
database systems
state space
test data
quality control
white box testing