Constant-Round Maliciously Secure Two-Party Computation in the RAM Model Posted October 31, 2016 by Nehora Krolzig