Login / Signup
On the Power of Secure Two-Party Computation.
Carmit Hazay
Muthuramakrishnan Venkitasubramaniam
Published in:
J. Cryptol. (2020)
Keyphrases
</>
key agreement protocol
database
lightweight
power consumption
information retrieval
database systems
efficient computation
security analysis
standard model