Personensuche
X
?
Proceedings of the 11th Workshop on Encrypted Computing & Applied Homomorphic Cryptography ,
1
Noah's Ark: Efficient Threshold-FHE Using Noise Flooding:
, In:
?
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security ,
4
The Return of Eratosthenes: Secure Generation of RSA Moduli..:
, In:
?
Financial Cryptography and Data Security; Lecture Notes in Computer Science ,
5
$$\mathsf {Rabbit}$$: Efficient Comparison for Secure Multi..:
, In:
?
Advances in Cryptology – EUROCRYPT 2020; Lecture Notes in Computer Science ,
6
On a Generalization of Substitution-Permutation Networks: T..:
, In:
?
Advances in Cryptology – ASIACRYPT 2020; Lecture Notes in Computer Science ,
7
Maliciously Secure Matrix Multiplication with Applications ..:
, In:
?
Lecture Notes in Computer Science; Progress in Cryptology – INDOCRYPT 2019 ,
8
MArBled Circuits: Mixing Arithmetic and Boolean Circuits wi..:
, In:
?
Proceedings of the 7th ACM Workshop on Encrypted Computing & Applied Homomorphic Cryptography ,
9
Zaphod : Efficiently Combining LSSS and Garbled Circuits..:
, In:
?
Topics in Cryptology – CT-RSA 2019; Lecture Notes in Computer Science ,
10
EPIC: Efficient Private Image Classification (or: Learning ..:
, In:
?
Lecture Notes in Computer Science; Computer Security – ESORICS 2019 ,
11
Feistel Structures for MPC, and More:
, In:
?
Lecture Notes in Computer Science; Security and Cryptography for Networks ,
12
Reducing Communication Channels in MPC:
, In:
?
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security ,
14
MPC-Friendly Symmetric Key Primitives:
, In:
?
2023 IEEE 73rd Electronic Components and Technology Conference (ECTC) ,
15