Constant-round maliciously secure two-party computation in the RAM model

From MaRDI portal
Publication:2010585

DOI10.1007/S00145-019-09321-3zbMATH Open1435.94131OpenAlexW2941238521MaRDI QIDQ2010585FDOQ2010585

Carmit Hazay, Avishay Yanai

Publication date: 27 November 2019

Published in: Journal of Cryptology (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/s00145-019-09321-3





Cites Work







This page was built for publication: Constant-round maliciously secure two-party computation in the RAM model

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2010585)