Login / Signup

Separating Two-Round Secure Computation From Oblivious Transfer.

Benny ApplebaumZvika BrakerskiSanjam GargYuval IshaiAkshayaram Srinivasan
Published in: ITCS (2020)
Keyphrases
  • databases
  • cross domain
  • neural network
  • genetic algorithm
  • artificial intelligence
  • information systems
  • knowledge transfer