Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adam in Private: Secure and Fast Training of Deep Neural Networks with Adaptive Moment Estimation., , , , , , , and . CoRR, (2021)Secret Sharing Schemes with Conversion Protocol to Achieve Short Share-Size and Extendibility to Multiparty Computation., , , , and . ACISP, volume 7959 of Lecture Notes in Computer Science, page 419-434. Springer, (2013)3-Party Secure Computation for RAMs: Optimal and Concretely Efficient., , , , and . TCC (1), volume 14369 of Lecture Notes in Computer Science, page 471-502. Springer, (2023)Tag-Based Secure Set-Intersection Protocol and Its Application to Privacy-Enhancing Biometrics., , and . NBiS, page 535-540. IEEE Computer Society, (2010)Efficient Bit-Decomposition and Modulus-Conversion Protocols with an Honest Majority., , , , and . ACISP, volume 10946 of Lecture Notes in Computer Science, page 64-82. Springer, (2018)Practical Password-Based Authentication Protocol for Secret Sharing Based Multiparty Computation., , , and . CANS, volume 9476 of Lecture Notes in Computer Science, page 179-196. Springer, (2015)Practically Efficient Multi-party Sorting Protocols from Comparison Sort Algorithms., , , , and . ICISC, volume 7839 of Lecture Notes in Computer Science, page 202-216. Springer, (2012)Fast Large-Scale Honest-Majority MPC for Malicious Adversaries., , , , , , and . J. Cryptol., 36 (3): 15 (July 2023)Fast Large-Scale Honest-Majority MPC for Malicious Adversaries., , , , , , and . CRYPTO (3), volume 10993 of Lecture Notes in Computer Science, page 34-64. Springer, (2018)Field Extension in Secret-Shared Form and Its Applications to Efficient Secure Computation., , , , , , , and . ACISP, volume 11547 of Lecture Notes in Computer Science, page 343-361. Springer, (2019)