<--- Back to Details
First PageDocument Content
Date: 2008-01-30 02:51:31

An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries∗ Yehuda Lindell† Benny Pinkas‡

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 532,70 KB

Share Document on Facebook

Similar Documents