Author of the publication

EPIC: Efficient Private Image Classification (or: Learning from the Masters).

, , , and . CT-RSA, volume 11405 of Lecture Notes in Computer Science, page 473-492. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modes of Operation Suitable for Computing on Encrypted Data., , and . IACR Trans. Symmetric Cryptol., 2017 (3): 294-324 (2017)Thresholdizing HashEdDSA: MPC to the Rescue., , and . IACR Cryptology ePrint Archive, (2020)Building a Community of Real-World Cryptographers., , and . IEEE Secur. Priv., 14 (6): 7-9 (2016)Hash Based Digital Signature Schemes., , and . IMACC, volume 3796 of Lecture Notes in Computer Science, page 96-115. Springer, (2005)A Cryptographic Application of Weil Descent., and . IMACC, volume 1746 of Lecture Notes in Computer Science, page 191-200. Springer, (1999)Sashimi: Cutting up CSI-FiSh Secret Keys to Produce an Actively Secure Distributed Signing Protocol., and . PQCrypto, volume 12100 of Lecture Notes in Computer Science, page 169-186. Springer, (2020)Cryptanalysis of MQV with partially known nonces., and . IACR Cryptology ePrint Archive, (2002)Modern Cryptography and Security: An Inter-Community Dialogue (Dagstuhl Seminar 16051)., , and . Dagstuhl Reports, 6 (1): 207-223 (2016)Reducing Communication Channels in MPC., , , and . IACR Cryptology ePrint Archive, (2017)More Efficient Constant-Round Multi-party Computation from BMR and SHE., , and . TCC (B1), volume 9985 of Lecture Notes in Computer Science, page 554-581. (2016)