Login / Signup

Hiding the Input-Size in Secure Two-Party Computation.

Yehuda LindellKobbi NissimClaudio Orlandi
Published in: ASIACRYPT (2) (2013)
Keyphrases
  • key agreement protocol
  • web services
  • input data
  • memory requirements