Author of the publication

How to Choose Suitable Secure Multiparty Computation Using Generalized SPDZ.

, , , , , and . ACM Conference on Computer and Communications Security, page 2198-2200. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing DNSSEC Keys via Threshold ECDSA From Generic MPC., , , , and . IACR Cryptology ePrint Archive, (2019)Efficient Maliciously Secure Multiparty Computation for RAM., and . IACR Cryptology ePrint Archive, (2017)The Oblivious Machine - or: How to Put the C into MPC.. IACR Cryptology ePrint Archive, (2015)Reducing Communication Channels in MPC., , , and . SCN, volume 11035 of Lecture Notes in Computer Science, page 181-199. Springer, (2018)Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol., , , , and . SCN, volume 7485 of Lecture Notes in Computer Science, page 241-263. Springer, (2012)Actively Secure OT Extension with Optimal Overhead., , and . CRYPTO (1), volume 9215 of Lecture Notes in Computer Science, page 724-741. Springer, (2015)MASCOT: Faster Malicious Arithmetic Secure Computation with Oblivious Transfer., , and . ACM Conference on Computer and Communications Security, page 830-842. ACM, (2016)Faster Secure Multi-party Computation of AES and DES Using Lookup Tables., , , , , and . ACNS, volume 10355 of Lecture Notes in Computer Science, page 229-249. Springer, (2017)PUBA: Privacy-Preserving User-Data Bookkeeping and Analytics., , , , , and . IACR Cryptol. ePrint Arch., (2021)Generalizing the SPDZ Compiler For Other Protocols., , , , , , and . ACM Conference on Computer and Communications Security, page 880-895. ACM, (2018)