Inproceedings,

Hiding the Input-Size in Secure Two-Party Computation.

, , and .
ASIACRYPT (2), volume 8270 of Lecture Notes in Computer Science, page 421-440. Springer, (2013)

Meta data

Tags

Users

  • @dblp

Comments and Reviews