Login / Signup
Separating Two-Round Secure Computation From Oblivious Transfer.
Benny Applebaum
Zvika Brakerski
Sanjam Garg
Yuval Ishai
Akshayaram Srinivasan
Published in:
ITCS (2020)
Keyphrases
</>
databases
cross domain
neural network
genetic algorithm
artificial intelligence
information systems
knowledge transfer