An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Fingerprint

Dive into the research topics of 'An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries'. Together they form a unique fingerprint.

Keyphrases

Computer Science