Cited By
View all- Chen JYang LWu WLiu YFeng Y(2025)Homomorphic Matrix Operations Under Bicyclic EncodingIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.349086220(1390-1404)Online publication date: 2025
- Ben-Itzhak YMöllering HPinkas BSchneider TSuresh ATkachenko OVargaftik SWeinert CYalame HYanai A(2024)ScionFL: Efficient and Robust Secure Quantized Aggregation2024 IEEE Conference on Secure and Trustworthy Machine Learning (SaTML)10.1109/SaTML59370.2024.00031(490-511)Online publication date: 9-Apr-2024
- Brüggemann ASchick OSchneider TSuresh AYalame H(2024)Don’t Eject the Impostor: Fast Three-Party Computation With a Known Cheater2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00164(503-522)Online publication date: 19-May-2024
- Show More Cited By