Constant-Round Maliciously Secure Two-Party Computation in the RAM Model Posted March 15, 2020 by Nehora Krolzig