Separating Two-Round Secure Computation From Oblivious TransferMarkBenny ApplebaumZvika BrakerskiSanjam Garg[0]Yuval Ishai[0]Akshayaram Srinivasan[0]ITCS, 2020.Cited by: 2|Bibtex|Views43|DOI:https://doi.org/10.4230/LIPIcs.ITCS.2020.71EI Other Links: dblp.uni-trier.de|academic.microsoft.comCode: Data: Full Text (Upload PDF)PPT (Upload PPT)Upload PDFUpload PPTYour rating :0 TagsCommentsSubmit