default search action
"Post-quantum secure two-party computing protocols against malicious ..."
Yachao Huo et al. (2024)
- Yachao Huo, Zongqu Zhao, Panke Qin, Shujing Wang, Chengfu Zheng:
Post-quantum secure two-party computing protocols against malicious adversaries. Concurr. Comput. Pract. Exp. 36(4) (2024)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.