Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PUBA: Privacy-Preserving User-Data Bookkeeping and Analytics., , , , , and . IACR Cryptol. ePrint Arch., (2021)A Note on "Secure Quantized Training for Deep Learning"., and . IACR Cryptol. ePrint Arch., (2023)Secure Quantized Training for Deep Learning., and . ICML, volume 162 of Proceedings of Machine Learning Research, page 10912-10938. PMLR, (2022)Use Your Brain! Arithmetic 3PC for Any Modulus with Active Security., , , , , and . ITC, volume 163 of LIPIcs, page 5:1-5:24. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2020)Faster Secure Multi-party Computation of AES and DES Using Lookup Tables., , , , , and . ACNS, volume 10355 of Lecture Notes in Computer Science, page 229-249. Springer, (2017)MASCOT: Faster Malicious Arithmetic Secure Computation with Oblivious Transfer., , and . ACM Conference on Computer and Communications Security, page 830-842. ACM, (2016)Actively Secure OT Extension with Optimal Overhead., , and . CRYPTO (1), volume 9215 of Lecture Notes in Computer Science, page 724-741. Springer, (2015)Reducing Communication Channels in MPC., , , and . SCN, volume 11035 of Lecture Notes in Computer Science, page 181-199. Springer, (2018)PUBA: Privacy-Preserving User-Data Bookkeeping and Analytics., , , , , and . Proc. Priv. Enhancing Technol., 2022 (2): 447-516 (2022)The Oblivious Machine - or: How to Put the C into MPC.. IACR Cryptology ePrint Archive, (2015)