Login / Signup
Billion-Gate Secure Computation with Malicious Adversaries.
Benjamin Kreuter
Abhi Shelat
Chih-Hao Shen
Published in:
USENIX Security Symposium (2012)
Keyphrases
</>
lightweight
security requirements
high speed
authentication scheme
malicious behavior
semi honest