First Page | Document Content | |
---|---|---|
Date: 2014-10-29 04:46:48 | Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer∗ Yehuda Lindell† Benny Pinkas‡Add to Reading ListSource URL: eprint.iacr.orgDownload Document from Source WebsiteFile Size: 629,21 KBShare Document on Facebook |