Secure Computation Using Leaky Correlations (Asymptotically Optimal Constructions)
2018 ◽
pp. 36-65
◽
2010 ◽
Vol 32
(8)
◽
pp. 1910-1913
2012 ◽
Vol 58
(2)
◽
pp. 1163-1185
◽
Keyword(s):
1995 ◽
Vol 05
(02)
◽
pp. 275-280
◽
Keyword(s):
2003 ◽
Vol 31
(2)
◽
pp. 14-16
◽
Keyword(s):