Constant-Round Maliciously Secure Two-Party Computation in the RAM Model

Carmit Hazay, Avishay Yanai. Constant-Round Maliciously Secure Two-Party Computation in the RAM Model. J. Cryptology, 32(4):1144-1199, 2019. [doi]

Abstract

Abstract is missing.