Login / Signup
Efficient Compiler to Covert Security with Public Verifiability for Honest Majority MPC.
Thomas Attema
Vincent Dunning
Maarten H. Everts
Peter Langenkamp
Published in:
IACR Cryptol. ePrint Arch. (2022)
Keyphrases
</>
real time
intrusion detection
information flow
security properties
general purpose
closed loop
highly optimized
e government
cost effective
security policies
computer security
security analysis