Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Waldo: A Private Time-Series Database from Function Secret Sharing., , , and . IACR Cryptol. ePrint Arch., (2021)CrypTFlow: Secure TensorFlow Inference., , , , , and . IACR Cryptol. ePrint Arch., (2019)Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation., , , , , , and . IACR Cryptol. ePrint Arch., (2020)Secure Medical Image Analysis with CrypTFlow., , , , , , , , and . CoRR, (2020)Waldo: A Private Time-Series Database from Function Secret Sharing., , , and . SP, page 2450-2468. IEEE, (2022)Efficient private database queries using ring-LWE somewhat homomorphic encryption., , and . J. Inf. Secur. Appl., (2019)CrypTFlow: Secure TensorFlow Inference., , , , , and . SP, page 336-353. IEEE, (2020)CrypTFlow2: Practical 2-Party Secure Inference., , , , , , and . CCS, page 325-342. ACM, (2020)SIRNN: A Math Library for Secure RNN Inference., , , , , , and . IACR Cryptol. ePrint Arch., (2021)ELSA: Secure Aggregation for Federated Learning with Malicious Actors., , , and . SP, page 1961-1979. IEEE, (2023)