Login / Signup
Two-Round Maliciously Secure Computation with Super-Polynomial Simulation.
Amit Agarwal
James Bartusek
Vipul Goyal
Dakshita Khurana
Giulio Malavolta
Published in:
IACR Cryptol. ePrint Arch. (2021)
Keyphrases
</>
mathematical model
security analysis
database
genetic algorithm
social networks
control system
wireless sensor networks
simulation study
numerical simulations
simulation model
mathematical models
efficient computation
security requirements
simulation environment
key management