Breaking MPC implementations through compression
暂无分享,去创建一个
[1] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[2] Vitaly Shmatikov,et al. The most dangerous code in the world: validating SSL certificates in non-browser software , 2012, CCS.
[3] Ming Li,et al. Clustering by compression , 2003, IEEE International Symposium on Information Theory, 2003. Proceedings..
[4] Patrick Traynor,et al. Mo(bile) Money, Mo(bile) Problems , 2017, ACM Trans. Priv. Secur..
[5] Ross J. Anderson. Why cryptosystems fail , 1993, CCS '93.
[6] Rebecca Schuller Borbely,et al. On normalized compression distance and large malware , 2015, Journal of Computer Virology and Hacking Techniques.
[7] Bin Ma,et al. The similarity metric , 2001, IEEE Transactions on Information Theory.
[8] Luis Filipe Coelho Antunes,et al. Clustering Fetal Heart Rate Tracings by Compression , 2006, 19th IEEE Symposium on Computer-Based Medical Systems (CBMS'06).
[9] Vladimir Kolesnikov,et al. Efficient Batched Oblivious PRF with Applications to Private Set Intersection , 2016, CCS.
[10] Steven M. Pincus,et al. A regularity statistic for medical data analysis , 1991, Journal of Clinical Monitoring.
[11] Claudio Orlandi,et al. Is multiparty computation any good in practice? , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[12] Andrew Chi-Chih Yao,et al. Theory and application of trapdoor functions , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[13] Jesper Buus Nielsen,et al. TinyLEGO: An Interactive Garbling Scheme for Maliciously Secure Two-party Computation , 2015, IACR Cryptol. ePrint Arch..
[14] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[15] Patrícia R. Sousa,et al. The Present and Future of Privacy-Preserving Computation in Fog Computing , 2018 .
[16] Stephanie Wehner,et al. Analyzing worms and network traffic using compression , 2005, J. Comput. Secur..
[17] Marcel Keller,et al. Practical Covertly Secure MPC for Dishonest Majority - Or: Breaking the SPDZ Limits , 2013, ESORICS.
[18] Yehuda Lindell,et al. High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority , 2016, IACR Cryptol. ePrint Arch..
[19] Vladimir Kolesnikov,et al. DUPLO: Unifying Cut-and-Choose for Garbled Circuits , 2017, CCS.
[20] Anton Stiglic,et al. Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems , 2001, Information Hiding.
[21] Michael Zohner,et al. ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation , 2015, NDSS.
[22] Simson L. Garfinkel,et al. Comparing the Usability of Cryptographic APIs , 2017, 2017 IEEE Symposium on Security and Privacy (SP).