Two-output Secure Computation With Malicious Adversaries
Chih-hao Shen and a. shelat
Eurocrypt 2011
Eurocrypt 2011
0 TrackBacks
Listed below are links to blogs that reference this entry: Two-output Secure Computation With Malicious Adversaries.
TrackBack URL for this entry: http://www.cs.virginia.edu/~shelat/mt421/mt-tb.cgi/32
Leave a comment