Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries

Posted by