Home  >>  Research

Two-output Secure Computation With Malicious Adversaries

Chih-hao Shen and a. shelat
Eurocrypt 2011

0 TrackBacks

Listed below are links to blogs that reference this entry: Two-output Secure Computation With Malicious Adversaries.

TrackBack URL for this entry: http://www.cs.virginia.edu/~shelat/mt421/mt-tb.cgi/32

Leave a comment

(If you haven't left a comment here before, you may need to be approved by the site owner before your comment will appear. Until then, it won't appear on the entry. Thanks for waiting.)