Article,

High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest Majority.

, , , and .
IACR Cryptology ePrint Archive, (2016)

Meta data

Tags

Users

  • @dblp

Comments and Reviews