Search

Your search keyword '"Secure two-party computation"' showing total 81 results

Search Constraints

Start Over You searched for: Descriptor "Secure two-party computation" Remove constraint Descriptor: "Secure two-party computation" Publisher acm Remove constraint Publisher: acm
81 results on '"Secure two-party computation"'

Search Results

1. COINN: Crypto/ML Codesign for Oblivious Inference via Neural Networks

2. TONIC

3. Is the Classical GMW Paradigm Practical? The Case of Non-Interactive Actively Secure 2PC

4. SET-OT

5. Removing the Bottleneck for Practical 2PC

6. Secure Multi-Party Computation

7. Practical and Secure Outsourcing of Discrete Log Group Exponentiation to a Single Malicious Server

8. Secure Hardware and Cryptography

9. Oblivious Neural Network Predictions via MiniONN Transformations

10. Efficient, Constant-Round and Actively Secure MPC

11. Global-Scale Secure Multiparty Computation

12. Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation

13. Brief Announcement

14. Equivocating Yao

15. Privacy-Preserving HMM Forward Computation

16. SecureScala: Scala embedding of secure computations

17. Improvements to Secure Computation with Penalties

18. DEMO

19. Alternative Implementations of Secure Real Numbers

20. Secure Stable Matching at Scale

21. High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority

22. Provable Secure Universal Steganography of Optimal Rate

23. Boosting GSHADE Capabilities

24. Secure Sum Computation for Insecure Networks

25. Combining Differential Privacy and Secure Multiparty Computation

26. A Domain-Specific Language for Low-Level Secure Multiparty Computation Protocols

27. Fast and Secure Three-party Computation

28. The general model of secure computation system

29. Oblivious outsourcing of garbled circuit generation

30. A Framework for Outsourcing of Secure Computation

31. SCORAM

32. On secure outsourcing of cryptographic computations to cloud

33. Privacy-Preserving Distance Computation and Proximity Testing on Earth, Done Right

34. GPU and CPU parallelization of honest-but-curious secure two-party computation

35. Lessons learned with PCF

36. Efficient secure computation optimization

37. Specifying sharemind's arithmetic black box

38. Challenges in compiler construction for secure two-party computation

39. Knowledge inference for optimizing secure multi-party computation

40. An information-flow type-system for mixed protocol secure computation

41. Faster secure two-party computation with less memory

42. An efficient and probabilistic secure bit-decomposition

43. Expression rewriting for optimizing secure computation

44. An equational approach to secure multi-party computation

45. Secure two-party computations in ANSI C

46. Secure two-party computation in sublinear (amortized) time

47. Automatically optimizing secure computation

48. Demo

49. Adaptively secure broadcast, revisited

50. Implementing virtual secure circuit using a custom-instruction approach

Catalog

Books, media, physical & digital resources