Publisher
Springer Nature Switzerland
Reference23 articles.
1. Aliasgari, M., Blanton, M., Zhang, Y., Steele, A.: Secure computation on floating point numbers. In: NDSS 2013. The Internet Society, February 2013
2. Bar-Ilan, J., Beaver, D.: Non-cryptographic fault-tolerant computing in constant number of rounds of interaction. In: Rudnicki, P. (ed.) 8th ACM PODC, pp. 201–209. ACM, August 1989. https://doi.org/10.1145/72981.72995
3. Lecture Notes in Computer Science;D Beaver,1992
4. Beimel, A.: Secret-sharing schemes: a survey, pp. 11–46, May 2011. https://doi.org/10.1007/978-3-642-20901-7_2
5. Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation (extended abstract). In: 20th ACM STOC, pp. 1–10. ACM Press, May 1988. https://doi.org/10.1145/62212.62213