Author:
Kreuter Ben,Patel Sarvar,Terner Ben
Publisher
Springer International Publishing
Reference32 articles.
1. Agrawal, R., Evfimievski, A., Srikant, R.: Information sharing across private databases. In: Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data, SIGMOD 2003, pp. 86–97. ACM, New York (2003). https://doi.org/10.1145/872757.872771
2. Asharov, G., Komargodski, I., Lin, W.K., Nayak, K., Peserico, E., Shi, E.: Optorama: optimal oblivious ram. Cryptology ePrint Archive, Report 2018/892 (2018). https://eprint.iacr.org/2018/892
3. Batcher, K.E.: Sorting networks and their applications. In: Proceedings of the April 30-May 2, 1968, Spring Joint Computer Conference, pp. 307–314. ACM (1968)
4. Beauquier, B., Darrot, É.: On arbitrary size waksman networks and their vulnerability. Parallel Process. Lett. 12(03n04), 287–296 (2002)
5. Bellare, M., Hoang, V.T., Rogaway, P.: Foundations of garbled circuits. Cryptology ePrint Archive, Report 2012/265 (2012). https://eprint.iacr.org/2012/265