Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
31
views
38
references
Top references
cited by
1
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,111
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology – EUROCRYPT 2021 : 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17–21, 2021, Proceedings, Part II
Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation
other
Author(s):
Elette Boyle
,
Nishanth Chandran
,
Niv Gilboa
,
Divya Gupta
,
Yuval Ishai
,
Nishant Kumar
,
Mayank Rathee
Publication date
(Online):
June 16 2021
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Point-of-Care Testing for COVID-19
Most cited references
38
Record
: found
Abstract
: not found
Conference Proceedings
: not found
How to generate and exchange secrets
Andrew Yao
(1986)
0
comments
Cited
309
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
SecureML: A System for Scalable Privacy-Preserving Machine Learning
Payman Mohassel
,
Yupeng Zhang
(2017)
0
comments
Cited
142
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
How to play ANY mental game
O Goldreich
,
S Micali
,
A. Wigderson
(1987)
0
comments
Cited
136
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2021
Publication date (Online):
June 16 2021
Pages
: 871-900
DOI:
10.1007/978-3-030-77886-6_30
SO-VID:
3f516fac-0740-4cfa-9ceb-4a1ad892a1eb
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields
pp. 35
Mind the Middle Layer: The HADES Design Strategy Revisited
pp. 64
Password Hashing and Preprocessing
pp. 92
Compactness of Hashing Modes and Efficiency Beyond Merkle Tree
pp. 127
Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3
pp. 155
Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2
pp. 187
Pre-computation Scheme of Window \(\tau \)NAF for Koblitz Curves Revisited
pp. 219
Dummy Shuffling Against Algebraic Attacks in White-Box Implementations
pp. 249
Advanced Lattice Sieving on GPUs, with Tensor Cores
pp. 283
Fast Verification of Masking Schemes in Characteristic Two
pp. 313
On the Power of Expansion: More Efficient Constructions in the Random Probing Model
pp. 344
Leakage-Resilience of the Shamir Secret-Sharing Scheme Against Physical-Bit Leakages
pp. 377
Leakage Resilient Value Comparison with Application to Message Authentication
pp. 408
The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free
pp. 438
Message-Recovery Laser Fault Injection Attack on the Classic McEliece Cryptosystem
pp. 468
Multi-source Non-malleable Extractors and Applications
pp. 501
Secure Software Leasing
pp. 531
Oblivious Transfer Is in MiniQCrypt
pp. 562
Security Analysis of Quantum Lightning
pp. 568
Classical vs Quantum Random Oracles
pp. 598
On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs of Sequential Work
pp. 630
Classical Proofs of Quantum Knowledge
pp. 663
Order-C Secure Multiparty Computation for Highly Repetitive Circuits
pp. 694
The More the Merrier: Reducing the Cost of Large Scale MPC
pp. 724
Multiparty Reusable Non-interactive Secure Computation from LWE
pp. 754
Unbounded Multi-party Computation from Learning with Errors
pp. 782
Generic Compiler for Publicly Verifiable Covert Multi-Party Computation
pp. 812
Constant-Overhead Unconditionally Secure Multiparty Computation Over Binary Fields
pp. 842
Breaking the Circuit Size Barrier for Secure Computation Under Quasi-Polynomial LPN
pp. 871
Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation
pp. 901
VOLE-PSI: Fast OPRF and Circuit-PSI from Vector-OLE
Similar content
1,111
Secure Biometric Authentication for Weak Computational Devices
Authors:
Mikhail J. Atallah
,
Keith B. Frikken
,
Michael T. Goodrich
…
Imeglimin increases glucose-dependent insulin secretion and improves β-cell function in patients with type 2 diabetes.
Authors:
G. Pacini
,
Stefania A Mari
,
P Fouqueray
…
Protein kinase CK2 in health and disease: Cellular functions of protein kinase CK2: a dynamic affair.
Authors:
O Filhol
,
C Cochet
See all similar
Cited by
1
Concretely efficient secure multi-party computation protocols: survey and more
Authors:
Dengguo Feng
,
Kang Yang
See all cited by