1. Secure training of decision trees with continuous attributes
2. Mohammad Anagreh , Peeter Laud , and Eero Vainikko . 2021 . Parallel Privacy-Preserving Shortest Path Algorithms . Cryptography , Vol. 5 , 4 (2021). https://doi.org/10.3390/cryptography5040027 10.3390/cryptography5040027 Mohammad Anagreh, Peeter Laud, and Eero Vainikko. 2021. Parallel Privacy-Preserving Shortest Path Algorithms. Cryptography, Vol. 5, 4 (2021). https://doi.org/10.3390/cryptography5040027
3. Toshinori Araki , Assi Barak , Jun Furukawa , Marcel Keller , Yehuda Lindell , Kazuma Ohara , and Hikaru Tsuchida . 2018. Generalizing the SPDZ Compiler For Other Protocols . In ACM CCS 2019 , , David Lie, Mohammad Mannan , Michael Backes, and XiaoFeng Wang (Eds.). ACM Press , 880--895. https://doi.org/10.1145/3243734.3243854 10.1145/3243734.3243854 Toshinori Araki, Assi Barak, Jun Furukawa, Marcel Keller, Yehuda Lindell, Kazuma Ohara, and Hikaru Tsuchida. 2018. Generalizing the SPDZ Compiler For Other Protocols. In ACM CCS 2019, , David Lie, Mohammad Mannan, Michael Backes, and XiaoFeng Wang (Eds.). ACM Press, 880--895. https://doi.org/10.1145/3243734.3243854
4. High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority
5. Secure Graph Analysis at Scale