Abhi Shelat, Chih-Hao Shen. Two-Output Secure Computation with Malicious Adversaries. In Kenneth G. Paterson, editor, Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings. Volume 6632 of Lecture Notes in Computer Science, pages 386-405, Springer, 2011. [doi]
@inproceedings{ShelatS11, title = {Two-Output Secure Computation with Malicious Adversaries}, author = {Abhi Shelat and Chih-Hao Shen}, year = {2011}, doi = {10.1007/978-3-642-20465-4_22}, url = {http://dx.doi.org/10.1007/978-3-642-20465-4_22}, researchr = {https://researchr.org/publication/ShelatS11}, cites = {0}, citedby = {0}, pages = {386-405}, booktitle = {Advances in Cryptology - EUROCRYPT 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, editor = {Kenneth G. Paterson}, volume = {6632}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-642-20464-7}, }