Login / Signup
Perfect Secure Computation in Two Rounds.
Benny Applebaum
Zvika Brakerski
Rotem Tsabary
Published in:
SIAM J. Comput. (2021)
Keyphrases
</>
machine learning
security analysis
real time
image sequences
evolutionary algorithm
sensor networks
lightweight
security requirements
security mechanisms
cryptographic protocols