Application-Scale Secure Multiparty Computation
暂无分享,去创建一个
John Launchbury | David W. Archer | Eric Mertens | Thomas DuBuisson | David W. Archer | J. Launchbury | Thomas Dubuisson | Eric Mertens
[1] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[2] Eyal Kushilevitz,et al. Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[3] Philip Wadler,et al. A practical subtyping system for Erlang , 1997, ICFP '97.
[4] Ivan Damgård,et al. Secure Multiparty Computation Goes Live , 2009, Financial Cryptography.
[5] Thomas Wilke,et al. A play on regular expressions: functional pearl , 2010, ICFP '10.
[6] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[7] Frederik Vercauteren,et al. Fully homomorphic SIMD operations , 2012, Designs, Codes and Cryptography.
[8] Martín Abadi,et al. Code-Carrying Authorization , 2008, ESORICS.
[9] Armin Biere,et al. DepQBF: A Dependency-Aware QBF Solver , 2010, J. Satisf. Boolean Model. Comput..
[10] Oded Goldreich. Foundations of Cryptography: Index , 2001 .
[11] Christoph Böhm,et al. The Basic Applications , 2013 .
[12] Joseph Bonneau,et al. What's in a Name? , 2020, Financial Cryptography.
[13] Dan Bogdanov,et al. Sharemind: A Framework for Fast Privacy-Preserving Computations , 2008, ESORICS.
[14] Marcel Keller,et al. Practical Covertly Secure MPC for Dishonest Majority - Or: Breaking the SPDZ Limits , 2013, ESORICS.
[15] John Launchbury,et al. Efficient lookup-table protocol in secure multiparty computation , 2012, ICFP.
[16] Oded Goldreich,et al. Foundations of Cryptography: Volume 2, Basic Applications , 2004 .