On the Power of Secure Two-Party Computation
Crossref DOI link: https://doi.org/10.1007/s00145-019-09314-2
Published Online: 2019-02-07
Published Print: 2020-01
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Hazay, Carmit
Venkitasubramaniam, Muthuramakrishnan
Text and Data Mining valid from 2019-02-07
Article History
Received: 7 January 2018
Revised: 27 January 2019
First Online: 7 February 2019