Login / Signup
Three Party Secure Computation with Friends and Foes.
Bar Alon
Amos Beimel
Eran Omri
Published in:
IACR Cryptol. ePrint Arch. (2023)
Keyphrases
</>
neural network
decision trees
sensitive data
cryptographic protocols
genetic algorithm
information systems
case study
highly efficient