Constant-Round Maliciously Secure Two-Party Computation in the RAM Model

Carmit Hazay, Avishay Yanai. Constant-Round Maliciously Secure Two-Party Computation in the RAM Model. In Martin Hirt, Adam D. Smith, editors, Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part I. Volume 9985 of Lecture Notes in Computer Science, pages 521-553, 2016. [doi]

@inproceedings{HazayY16-0,
  title = {Constant-Round Maliciously Secure Two-Party Computation in the RAM Model},
  author = {Carmit Hazay and Avishay Yanai},
  year = {2016},
  doi = {10.1007/978-3-662-53641-4_20},
  url = {http://dx.doi.org/10.1007/978-3-662-53641-4_20},
  researchr = {https://researchr.org/publication/HazayY16-0},
  cites = {0},
  citedby = {0},
  pages = {521-553},
  booktitle = {Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part I},
  editor = {Martin Hirt and Adam D. Smith},
  volume = {9985},
  series = {Lecture Notes in Computer Science},
  isbn = {978-3-662-53640-7},
}