Author:
Hetz Laura,Schneider Thomas,Weinert Christian
Publisher
Springer Nature Switzerland
Reference75 articles.
1. Albrecht, M.R., Rechberger, C., Schneider, T., Tiessen, T., Zohner, M.: Ciphers for MPC and FHE. In: EUROCRYPT (2015)
2. Ali, A., et al.: Communication-computation trade-offs in PIR. In: USENIX Security (2021)
3. Angel, S., Chen, H., Laine, K., Setty, S.T.V.: PIR with compressed queries and amortized query processing. In: S &P (2018)
4. Apple, Google: Exposure Notification Privacy-preserving Analytics (ENPA) White Paper (2021). https://covid19-static.cdn-apple.com/applications/covid19/current/static/contact-tracing/pdf/ENPA_White_Paper.pdf
5. Asharov, G., Lindell, Y., Schneider, T., Zohner, M.: More efficient oblivious transfer extensions with security for malicious adversaries. In: EUROCRYPT (2015)