Login / Signup
Concurrent-Secure Two-Party Computation in Two Rounds from Subexponential LWE.
Saikrishna Badrinarayanan
Rex Fernando
Amit Sahai
Published in:
IACR Cryptol. ePrint Arch. (2021)
Keyphrases
</>
neural network
security issues
lightweight
key agreement protocol
data sets
encryption scheme
authentication protocol
security model