Expand description

Implementations of two-party secure computation.

Modules

Implementation of semi-honest two-party computation.