 Date: 2014-10-29 04:46:48
| | Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer∗ Yehuda Lindell† Benny Pinkas‡Add to Reading ListSource URL: eprint.iacr.orgDownload Document from Source Website File Size: 629,21 KBShare Document on Facebook
|