Inproceedings,

Secure Computation from Leaky Correlated Randomness.

, , , and .
CRYPTO (2), volume 9216 of Lecture Notes in Computer Science, page 701-720. Springer, (2015)

Meta data

Tags

Users

  • @dblp

Comments and Reviews