Designing fully secure protocols for secure two-party computation of constant-domain functions
Citació
Daza V, Makriyannis N. Designing fully secure protocols for secure two-party computation of constant-domain functions. In: Kalai Y, Reyzin L, editors. Theory of Cryptography. TCC 2017; 2017 Nov 12-5; Baltimore, USA. Berlin: Springer; 2017. p. 581-611. (LNCS; no. 10677). DOI: 10.1007/978-3-319-70500-2_20






