Adam in Private: Secure and Fast Training of Deep Neural Networks with Adaptive Moment Estimation. | 0 | 0.34 | 2022 |
Efficient Secure Three-Party Sorting with Applications to Data Analysis and Heavy Hitters | 0 | 0.34 | 2022 |
Field Extension In Secret-Shared Form And Its Applications To Efficient Secure Computation | 0 | 0.34 | 2019 |
An Efficient Secure Three-Party Sorting Protocol with an Honest Majority. | 0 | 0.34 | 2019 |
High-Throughput Secure AES Computation. | 0 | 0.34 | 2018 |
Efficient Bit-Decomposition And Modulus-Conversion Protocols With An Honest Majority | 0 | 0.34 | 2018 |
Password-Based Authentication Protocol For Secret-Sharing-Based Multiparty Computation | 0 | 0.34 | 2018 |
Fast Large-Scale Honest-Majority MPC for Malicious Adversaries. | 3 | 0.37 | 2018 |
Computational SS and conversion protocols in both active and passive settings. | 0 | 0.34 | 2017 |
Secret Sharing With Share-Conversion: Achieving Small Share-Size And Extendibility To Multiparty Computation | 1 | 0.40 | 2015 |
k-anonymous Microdata Release via Post Randomisation Method. | 1 | 0.37 | 2015 |
Adaptively And Unconditionally Secure Conversion Protocols Between Ramp And Linear Secret Sharing | 0 | 0.34 | 2015 |
Oblivious Radix Sort: An Efficient Sorting Algorithm for Practical Secure Multi-party Computation. | 0 | 0.34 | 2014 |
Actively Private and Correct MPC Scheme in t<n/2 from Passively Secure Schemes with Small Overhead. | 6 | 0.50 | 2014 |
Secret Sharing Schemes with Conversion Protocol to Achieve Short Share-Size and Extendibility to Multiparty Computation. | 2 | 0.39 | 2013 |
Practically efficient multi-party sorting protocols from comparison sort algorithms | 14 | 0.58 | 2012 |
Tag-Based Secure Set-Intersection Protocol and Its Application to Privacy-Enhancing Biometrics | 0 | 0.34 | 2010 |