Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries

Yehuda Lindell, Benny Pinkas, Nigel Smart
SCN 2008 [pdf] [bibtex]


Longer summary goes here

Categories:

Todo Implementations