Back to Results
First PageMeta Content



An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries∗ Yehuda Lindell† Benny Pinkas‡
Add to Reading List

Document Date: 2008-01-30 02:51:31


Open Document

File Size: 532,70 KB

Share Result on Facebook
UPDATE