Two-Party Secure Computation for Malicious Adversaries

Posted by