Author of the publication

Information-theoretically secure oblivious polynomial evaluation in the commodity-based model.

, , , , , , and . Int. J. Inf. Sec., 14 (1): 73-84 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Transport mode assessment for inbound logistics: A study based on coffee industry., , , , and . SMC, page 1318-1323. IEEE, (2014)Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models based on Pre-Computation., , , , , , and . IACR Cryptology ePrint Archive, (2016)Achieving Oblivious Transfer Capacity of Generalized Erasure Channels in the Malicious Model., , , and . IACR Cryptology ePrint Archive, (2009)A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM., , , , and . IACR Cryptology ePrint Archive, (2017)Performability evaluation of transport modes for cloud-based inbound logistics: a study based on coffee industry., , , , and . Int. J. Manuf. Technol. Manag., 34 (2): 126-147 (2020)Information-Theoretically Secure String Commitments Based on Packet Reordering Channels., , , and . IEEE Access, (2021)Round and Communication Balanced Protocols for Oblivious Evaluation of Finite State Machines., , and . IACR Cryptol. ePrint Arch., (2021)Practical, Label Private Deep Learning Training based on Secure Multiparty Computation and Differential Privacy., , , and . IACR Cryptol. ePrint Arch., (2021)Unconditionally Secure, Universally Composable Privacy Preserving Linear Algebra., , , , , and . IEEE Trans. Inf. Forensics Secur., 11 (1): 59-73 (2016)An information theoretical model for quantum secret sharing., , , , and . Quantum Inf. Comput., 5 (1): 69-80 (2005)