ckcest
HomeResearch-feedChannelRankingsGCTTHU AI TROpen DataMust Reading
  • Research Feed
  • Log in AMiner
    Academic ProfileUser Profile
    Research FeedMy FollowingPaper Collections

Separating Two-Round Secure Computation From Oblivious Transfer

Benny Applebaum
Benny Applebaum
Zvika Brakerski
Zvika Brakerski
Sanjam Garg
Sanjam Garg
[0]
Yuval Ishai
Yuval Ishai
[0]
Akshayaram Srinivasan
Akshayaram Srinivasan
[0]

ITCS, 2020.

Cited by: 2|Bibtex|Views43|DOI:https://doi.org/10.4230/LIPIcs.ITCS.2020.71
EI
Other Links: dblp.uni-trier.de|academic.microsoft.com

Code:

Data:

Full Text (Upload PDF)
PPT (Upload PPT)
Your rating :
0

 

Tags
Comments
  • © 2005-2021 AMiner 京ICP备20011824号-11

  • Contact
  • Introduction
  • Join-us
  • Reader-recommendation
  • RQcode