Cryptology ePrint Archive: Report 2015/782
Available versions in chronological order
20150806:143811 (posted 06-Aug-2015 14:38:11 UTC)
Secure two-party computation in applied pi-calculus: models and verification
Sergiu Bursuc
Original publication (with minor differences): 10th Symposium on Trustworthy Global Computing (TGC 2015)
20150807:125840 (posted 07-Aug-2015 12:58:40 UTC)
Secure two-party computation in applied pi-calculus: models and verification
Sergiu Bursuc
Original publication (with minor differences): 10th Symposium on Trustworthy Global Computing (TGC 2015)
[
Cryptology ePrint archive
]