Login / Signup
A New Approach to Practical Active-Secure Two-Party Computation.
Jesper Buus Nielsen
Peter Sebastian Nordholt
Claudio Orlandi
Sai Sheshank Burra
Published in:
CRYPTO (2012)
Keyphrases
</>
method invocation
real world
search engine
key agreement protocol
database
data sets
genetic algorithm
decision trees
image sequences
lightweight
practical application
practical problems
record linkage
secret sharing
provably secure