Secure computation using leaky correlations (asymptotically optimal constructions)

From MaRDI portal
Publication:1631316

DOI10.1007/978-3-030-03810-6_2zbMath1430.94058OpenAlexW2899913052MaRDI QIDQ1631316

Alexander R. Block, Hemanta K. Maji, Divya Gupta, Hai H. Nguyen

Publication date: 6 December 2018

Full work available at URL: https://doi.org/10.1007/978-3-030-03810-6_2




Related Items (3)



Cites Work


This page was built for publication: Secure computation using leaky correlations (asymptotically optimal constructions)