Security for Malicious Adversaries with Yao’s Protocol – part 2

Posted by