Author:
Mihailescu Marius Iulian,Nita Stefania Loredana
Reference15 articles.
1. Laud P., Pankova A. (2014) Verifiable Computation in Multiparty Protocols with Honest Majority. In: Chow S.S.M., Liu J.K., Hui L.C.K., Yiu S.M. (eds) Provable Security. ProvSec 2014. Lecture Notes in Computer Science, vol. 8782. Springer, Cham.
2. Bogdanov D., Laur S., Talviste R. (2014) A Practical Analysis of Oblivious Sorting Algorithms for Secure Multiparty Computation. In: Bernsmed K., Fischer-Hübner S. (eds) Secure IT Systems. NordSec 2014. Lecture Notes in Computer Science, vol. 8788. Springer, Cham.
3. D. Bogdanov, L. Kamm, S. Laur, and P. Pruulmann-Vengerfeldt, “Secure multi-party data analysis: End user validation and practical experiments,” 2014.
4. PicoSHA2 - a C++ SHA256 hash generator, https://github.com/okdshin/PicoSHA2
5. B. ÖzÇakmak, A. Özbİlen, U. YavanoĞlu, and K. Cİn, “Neural and Quantum Cryptography in Big Data: A Review,” 2019 IEEE International Conference on Big Data (Big Data), Los Angeles, CA, USA, 2019, pp. 2413-2417, doi: 10.1109/BigData47090.2019.9006238.