Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries

Posted by