An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries

Research output: Contribution to journalArticlepeer-review

32 Scopus citations

Fingerprint

Dive into the research topics of 'An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries'. Together they form a unique fingerprint.

Keyphrases

Computer Science