Author of the publication

Secure parallel computation on national scale volumes of data.

, , , and . USENIX Security Symposium, page 2487-2504. USENIX Association, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Crypto-democracy and the Trustworthy., , and . CoRR, (2014)Secure Two-Party Computation via Leaky Generalized Oblivious Transfer., and . IACR Cryptology ePrint Archive, (2013)Reactive Garbling: Foundation, Instantiation, Application., and . ASIACRYPT (2), volume 10032 of Lecture Notes in Computer Science, page 1022-1052. (2016)Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation., , and . CCS, page 21-37. ACM, (2017)Foundations of Reactive Garbling Schemes., and . IACR Cryptology ePrint Archive, (2015)Gate-scrambling Revisited - or: The TinyTable protocol for 2-Party Secure Computation., , , and . IACR Cryptology ePrint Archive, (2016)Fast Secure Multiparty ECDSA with Practical Distributed Key Generation and Applications to Cryptocurrency Custody., , and . IACR Cryptology ePrint Archive, (2018)Resource-Efficient OT Combiners with Active Security., , , and . TCC (2), volume 10678 of Lecture Notes in Computer Science, page 461-486. Springer, (2017)Highly Efficient OT-Based Multiplication Protocols., , , and . EUROCRYPT (1), volume 13275 of Lecture Notes in Computer Science, page 180-209. Springer, (2022)Two-party Private Set Intersection with an Untrusted Third Party., , and . ACM Conference on Computer and Communications Security, page 2403-2420. ACM, (2019)