Constant-Round Maliciously Secure Two-Party Computation in the RAM Model

Posted by