An efficient protocol for secure two-party computation in the presence of malicious adversaries

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

270 Scopus citations

Fingerprint

Dive into the research topics of 'An efficient protocol for secure two-party computation in the presence of malicious adversaries'. Together they form a unique fingerprint.

Keyphrases

Computer Science