Publisher
FSAEIHE South Ural State University (National Research University)
Subject
Computational Mathematics,Computational Theory and Mathematics,Modeling and Simulation,Software
Reference15 articles.
1. 1. Yao A. Protocols for Secure Computations. IEEE Computer Society, 1982, pp. 160-164.
2. 2. Archer D.W., Bogdanov D., Lindell Y. et al. From Keys to Databases-Real-World Applications of Secure Multi-Party Computation. The Computer Journal, 2018, vol. 61, no. 12, pp. 1749-1771.
3. 3. Garg S., Ghodsi Z., Hazay C. et al. Outsourcing Private Machine Learning via Lightweight Secure Arithmetic Computation. Available at: https://arxiv.org/abs/1812.01372 (accessed 04.05.2022)
4. 4. Jintai Ding, Bo-Yin Yang. Multivariate Public Key Cryptography. Post-Quantum Cryptography, New York, Springer, 2009, pp. 193-241.
5. 5. Bruneau N., Guilley S., Heuser A. Optimal Side-Channel Attacks for Multivariate Leakages and Multiple Models. Journal of Cryptographic Engineering, 2017, no. 7, pp. 331-341.