Cite
Post‐quantum secure two‐party computing protocols against malicious adversaries.
MLA
Huo, Yachao, et al. “Post‐quantum Secure Two‐party Computing Protocols against Malicious Adversaries.” Concurrency & Computation: Practice & Experience, vol. 36, no. 4, Feb. 2024, pp. 1–14. EBSCOhost, https://doi.org/10.1002/cpe.7923.
APA
Huo, Y., Zhao, Z., Qin, P., Wang, S., & Zheng, C. (2024). Post‐quantum secure two‐party computing protocols against malicious adversaries. Concurrency & Computation: Practice & Experience, 36(4), 1–14. https://doi.org/10.1002/cpe.7923
Chicago
Huo, Yachao, Zongqu Zhao, Panke Qin, Shujing Wang, and Chengfu Zheng. 2024. “Post‐quantum Secure Two‐party Computing Protocols against Malicious Adversaries.” Concurrency & Computation: Practice & Experience 36 (4): 1–14. doi:10.1002/cpe.7923.