Better security-efficiency trade-offs in permutation-based two-party computation

From MaRDI portal
Publication:6157519

DOI10.1007/978-3-030-92075-3_10OpenAlexW3215147049MaRDI QIDQ6157519

Stefano Tessaro, Yu Long Chen

Publication date: 12 May 2023

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-030-92075-3_10




Related Items (3)



Cites Work


This page was built for publication: Better security-efficiency trade-offs in permutation-based two-party computation