Inproceedings,

Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries.

, , and .
SCN, volume 5229 of Lecture Notes in Computer Science, page 2-20. Springer, (2008)

Meta data

Tags

Users

  • @dblp

Comments and Reviews