International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Constant-Round Maliciously Secure Two-Party Computation in the RAM Model

Authors:
Carmit Hazay
Avishay Yanai
Download:
DOI: 10.1007/978-3-662-53641-4_20
Search ePrint
Search Google
Conference: TCC 2016
BibTeX
@inproceedings{tcc-2016-27962,
  title={Constant-Round Maliciously Secure Two-Party Computation in the RAM Model},
  booktitle={TCC (B1)},
  publisher={Springer},
  pages={521-553},
  doi={10.1007/978-3-662-53641-4_20},
  author={Carmit Hazay and Avishay Yanai},
  year=2016
}