Author of the publication

Best of Both Worlds in Secure Computation, with Low Communication Overhead.

, , and . ACNS, volume 10892 of Lecture Notes in Computer Science, page 340-359. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Complete Fairness in Multi-Party Computation Without an Honest Majority., and . IACR Cryptology ePrint Archive, (2008)Fully Secure PSI via MPC-in-the-Head., , and . IACR Cryptol. ePrint Arch., (2022)Simple and Efficient Two-Server ORAM., , and . ASIACRYPT (3), volume 11274 of Lecture Notes in Computer Science, page 141-157. Springer, (2018)Rational Secret Sharing, Revisited., and . SCN, volume 4116 of Lecture Notes in Computer Science, page 229-241. Springer, (2006)Secure Sampling with Sublinear Communication., , , , and . TCC (2), volume 13748 of Lecture Notes in Computer Science, page 348-377. Springer, (2022)Secure Computation of MIPS Machine Code., , , and . ESORICS (2), volume 9879 of Lecture Notes in Computer Science, page 99-117. Springer, (2016)Two-party Private Set Intersection with an Untrusted Third Party., , and . ACM Conference on Computer and Communications Security, page 2403-2420. ACM, (2019)Complete fairness in secure two-party computation., , , and . STOC, page 413-422. ACM, (2008)Secure parallel computation on national scale volumes of data., , , and . USENIX Security Symposium, page 2487-2504. USENIX Association, (2020)Spreading the Privacy Blanket: - Differentially Oblivious Shuffling for Differential Privacy., , , and . ACNS, volume 13269 of Lecture Notes in Computer Science, page 501-520. Springer, (2022)