Author:
Garg Sanjam,Ishai Yuval,Srinivasan Akshayaram
Publisher
Springer International Publishing
Reference50 articles.
1. Applebaum, B., Brakerski, Z., Tsabary, R.: Perfect secure computation in two rounds. To appear in TCC (2018). https://eprint.iacr.org/2018/894
2. Lecture Notes in Computer Science;P Ananth,2018
3. Applebaum, B., Ishai, Y., Kushilevitz, E.: Cryptography in NC
$$^0$$
. In: 45th FOCS, Rome, Italy, 17–19 October 2004, pp. 166–175. IEEE Computer Society Press (2004)
4. Asharov, G., Jain, A., Wichs, D.: Multiparty computation with low communication, computation and interaction via threshold FHE. IACR Cryptology ePrint Archive, p. 613 (2011)
5. Asharov, G., Lindell, Y., Schneider, T., Zohner, M.: More efficient oblivious transfer and extensions for faster secure computation. In: Sadeghi, A.-R., Gligor, V.D., Yung, M. (eds.) ACM CCS 13, Berlin, Germany, 4–8 November 2013, pp. 535–548. ACM Press (2013)
Cited by
30 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献