Constant-round maliciously secure two-party computation in the RAM model

From MaRDI portal
Publication:2010585






Cites work







This page was built for publication: Constant-round maliciously secure two-party computation in the RAM model

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2010585)