Login / Signup
Hiding the Input-Size in Secure Two-Party Computation.
Yehuda Lindell
Kobbi Nissim
Claudio Orlandi
Published in:
ASIACRYPT (2) (2013)
Keyphrases
</>
key agreement protocol
web services
input data
memory requirements