Security for Malicious Adversaries with Yao’s Protocol – part 1

Posted by