Author of the publication

Efficient Unconditionally Secure Comparison and Privacy Preserving Machine Learning Classification Protocols.

, , , and . ProvSec, volume 9451 of Lecture Notes in Computer Science, page 354-367. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Oblivious Transfer Capacity of Generalized Erasure Channels against Malicious Adversaries., and . IACR Cryptology ePrint Archive, (2014)A survey on design and implementation of protected searchable data in the cloud., , , and . Comput. Sci. Rev., (2017)TARDIS: Time And Relative Delays In Simulation., , , , and . IACR Cryptol. ePrint Arch., (2020)Digital Signatures from Strong RSA without Prime Generation., , and . Public Key Cryptography, volume 9020 of Lecture Notes in Computer Science, page 217-235. Springer, (2015)On the Commitment Capacity of Unfair Noisy Channels., , and . IACR Cryptology ePrint Archive, (2019)Privacy-Preserving Classification of Personal Text Messages with Secure Multi-Party Computation: An Application to Hate-Speech Detection., , , , and . IACR Cryptology ePrint Archive, (2019)Analysing Mining Machine Shutdown Price., , , and . IACR Cryptol. ePrint Arch., (2020)Achieving Oblivious Transfer Capacity of Generalized Erasure Channels in the Malicious Model., , , and . IEEE Trans. Inf. Theory, 57 (8): 5566-5571 (2011)Commitment and Oblivious Transfer in the Bounded Storage Model With Errors., , and . IEEE Trans. Inf. Theory, 64 (8): 5970-5984 (2018)On the Oblivious Transfer Capacity of Generalized Erasure Channels Against Malicious Adversaries: The Case of Low Erasure Probability., and . IEEE Trans. Inf. Theory, 63 (10): 6819-6826 (2017)