Author of the publication

MASCOT: Faster Malicious Arithmetic Secure Computation with Oblivious Transfer.

, , and . ACM Conference on Computer and Communications Security, page 830-842. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Orsini, Emmanuela
add a person with the name Orsini, Emmanuela
 

Other publications of authors with the same name

Computing the distance distribution of systematic non-linear codes, , and . CoRR, (2009)Actively Secure 1-out-of-N OT Extension with Application to Private Set Intersection., , and . CT-RSA, volume 10159 of Lecture Notes in Computer Science, page 381-396. Springer, (2017)Bootstrapping BGV Ciphertexts With A Wider Choice of p and q., , and . IACR Cryptology ePrint Archive, (2014)Secure Oblivious Transfer from Semi-Commutative Masking., , , and . IACR Cryptology ePrint Archive, (2018)Overdrive2k: Efficient Secure MPC over Z2k from Somewhat Homomorphic Encryption., , and . IACR Cryptology ePrint Archive, (2019)Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT)., , , and . ASIACRYPT (3), volume 11274 of Lecture Notes in Computer Science, page 86-117. Springer, (2018)Bootstrapping BGV Ciphertexts with a Wider Choice of p and q., , and . Public Key Cryptography, volume 9020 of Lecture Notes in Computer Science, page 673-698. Springer, (2015)General Error Locator Polynomials for Binary Cyclic Codes With t<=2 and n<63., and . IEEE Trans. Information Theory, 53 (3): 1095-1107 (2007)Bootstrapping BGV ciphertexts with a wider choice of p and q., , and . IET Information Security, 10 (6): 348-357 (2016)On the shape of the general error locator polynomial for cyclic codes., , , and . CoRR, (2015)