@dblp

Concurrent Secure Computation via Non-Black Box Simulation.

, , and . CRYPTO (2), volume 9216 of Lecture Notes in Computer Science, page 23-42. Springer, (2015)

Links and resources

Tags