Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

XONN: XNOR-based Oblivious Deep Neural Network Inference., , , , , and . USENIX Security Symposium, page 1501-1518. USENIX Association, (2019)Deepsecure: scalable provably-secure deep learning., , and . DAC, page 2:1-2:6. ACM, (2018)SANNS: Scaling Up Secure Approximate k-Nearest Neighbors Search., , , , , and . CoRR, (2019)Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric Matching Algorithms., , , , , and . CCS, page 1171-1186. ACM, (2019)HEAX: An Architecture for Computing on Encrypted Data., , , and . ASPLOS, page 1295-1309. ACM, (2020)ASPLOS 2020 was canceled because of COVID-19..PriSearch: Efficient Search on Private Data., , and . DAC, page 14:1-14:6. ACM, (2017)GenMatch: Secure DNA compatibility testing., , , and . HOST, page 248-253. IEEE Computer Society, (2016)MPCircuits: Optimized Circuit Generation for Secure Multi-Party Computation., , , and . HOST, page 198-207. IEEE, (2019)Sub-linear Privacy-preserving Search with Untrusted Server and Semi-honest Parties., , , , and . CoRR, (2016)Privacy-preserving deep learning and inference., and . ICCAD, page 18. ACM, (2018)