Constant-Round Maliciously Secure Two-Party Computation in the RAM Model
Crossref DOI link: https://doi.org/10.1007/s00145-019-09321-3
Published Online: 2019-04-23
Published Print: 2019-10
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Hazay, Carmit
Yanai, Avishay
Text and Data Mining valid from 2019-04-23
Article History
Received: 16 October 2016
Revised: 2 April 2019
First Online: 23 April 2019
Free to read: This content has been made available to all.