Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries

Posted by