Login / Signup
Round-Optimal Secure Two-Party Computation from Trapdoor Permutations.
Michele Ciampi
Rafail Ostrovsky
Luisa Siniscalchi
Ivan Visconti
Published in:
IACR Cryptol. ePrint Arch. (2017)
Keyphrases
</>
dynamic programming
efficient computation
optimal solution
security model
neural network
information systems
evolutionary algorithm
optimal control
security issues
security properties