Cryptology ePrint Archive: Report 2013/196

Available versions in chronological order


Fast Two-Party Secure Computation with Minimal Assumptions
abhi shelat and Chih-hao Shen

Fast Two-Party Secure Computation with Minimal Assumptions
abhi shelat and Chih-hao Shen

Fast Two-Party Secure Computation with Minimal Assumptions
abhi shelat and Chih-hao Shen

Fast Two-Party Secure Computation with Minimal Assumptions
abhi shelat and Chih-hao Shen

Fast Two-Party Secure Computation with Minimal Assumptions
abhi shelat and Chih-hao Shen


[ Cryptology ePrint archive ]