posman_ / Publications
Forum
Question about implementation of "secure f"
Hi I'm in the process of implementing the calculation of the "secure f" but there is something I don't understand. I've already read the article explaining the algorithm and I understand it almost entirely. But there is still one part that is not entirely clear. The article I'm talking about is "