• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Perfect Secure Computation in Two Rounds.

Benny ApplebaumZvika BrakerskiRotem Tsabary
Published in: SIAM J. Comput. (2021)
Keyphrases
  • machine learning
  • security analysis
  • real time
  • image sequences
  • evolutionary algorithm
  • sensor networks
  • lightweight
  • security requirements
  • security mechanisms
  • cryptographic protocols