Inproceedings,

Constant-Round Maliciously Secure Two-Party Computation in the RAM Model.

, and .
TCC (B1), volume 9985 of Lecture Notes in Computer Science, page 521-553. (2016)

Meta data

Tags

Users

  • @dblp

Comments and Reviews