@dblp

Secure Computation Based on Leaky Correlations: High Resilience Setting.

, , and . CRYPTO (2), volume 10402 of Lecture Notes in Computer Science, page 3-32. Springer, (2017)

Links and resources

Tags