Cited By
View all- Deligios GKonring ALiu-Zhang CNarayanan V(2024)Statistical Layered MPCTheory of Cryptography10.1007/978-3-031-78023-3_12(362-394)Online publication date: 2-Dec-2024
- Bangalore LChoudhury AGarimella GHansdah RKrishnaswamy DVaidya N(2019)Round efficient computationally secure multi-party computation revisitedProceedings of the 20th International Conference on Distributed Computing and Networking10.1145/3288599.3288600(292-301)Online publication date: 4-Jan-2019
- Andrychowicz MDziembowski SFaust S(2016)Circuit Compilers with $$O1/\log n$$O1/logn Leakage RateProceedings, Part II, of the 35th Annual International Conference on Advances in Cryptology --- EUROCRYPT 2016 - Volume 966610.5555/3081738.3081759(586-615)Online publication date: 8-May-2016
- Show More Cited By