@dblp

Secure Computation from Leaky Correlated Randomness.

, , , and . CRYPTO (2), volume 9216 of Lecture Notes in Computer Science, page 701-720. Springer, (2015)

Links and resources

Tags