Author of the publication

Fast Large-Scale Honest-Majority MPC for Malicious Adversaries.

, , , , , , and . CRYPTO (3), volume 10993 of Lecture Notes in Computer Science, page 34-64. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DEMO: High-Throughput Secure Three-Party Computation of Kerberos Ticket Generation., , , , , and . ACM Conference on Computer and Communications Security, page 1841-1843. ACM, (2016)Blazing Fast 2PC in the Offline/Online Setting with Security for Malicious Adversaries., and . ACM Conference on Computer and Communications Security, page 579-590. ACM, (2015)On the Feasibility of Extending Oblivious Transfer., and . J. Cryptol., 31 (3): 737-773 (2018)Secure Multi-Party Computation without Agreement., and . J. Cryptol., 18 (3): 247-287 (2005)Fast Distributed RSA Key Generation for Semi-honest and Malicious Adversaries., , , and . CRYPTO (2), volume 10992 of Lecture Notes in Computer Science, page 331-361. Springer, (2018)On the Limitations of Universally Composable Two-Party Computation without Set-up Assumptions., , and . EUROCRYPT, volume 2656 of Lecture Notes in Computer Science, page 68-86. Springer, (2003)Cut-and-Choose Yao-Based Secure Computation in the Online/Offline and Batch Settings., and . CRYPTO (2), volume 8617 of Lecture Notes in Computer Science, page 476-494. Springer, (2014)Session-Key Generation Using Human Passwords Only., and . CRYPTO, volume 2139 of Lecture Notes in Computer Science, page 408-432. Springer, (2001)Completeness for Symmetric Two-Party Functionalities - Revisited., , and . ASIACRYPT, volume 7658 of Lecture Notes in Computer Science, page 116-133. Springer, (2012)A Practical Application of Differential Privacy to Personalized Online Advertising., and . IACR Cryptology ePrint Archive, (2011)