Constant-Round Maliciously Secure Two-Party Computation in the RAM Model

From MaRDI portal
Publication:3179369

DOI10.1007/978-3-662-53641-4_20zbMath1406.94062OpenAlexW2533094742MaRDI QIDQ3179369

Avishay Yanai, Carmit Hazay

Publication date: 21 December 2016

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-53641-4_20




Related Items (4)



Cites Work


This page was built for publication: Constant-Round Maliciously Secure Two-Party Computation in the RAM Model