Cryptology ePrint Archive: Report 2011/533

Available versions in chronological order


Two-Output Secure Computation with Malicious Adversaries
abhi shelat and Chih-hao Shen
Publication Info: full version of our EUROCRYPT'11 paper

Two-Output Secure Computation with Malicious Adversaries
abhi shelat and Chih-hao Shen
Publication Info: full version of our EUROCRYPT'11 paper

Two-Output Secure Computation with Malicious Adversaries
abhi shelat and Chih-hao Shen
Publication Info: full version of our EUROCRYPT'11 paper


[ Cryptology ePrint archive ]