@article{Maurer,
author = {Ueli M. Maurer},
title = {Secure multi-party computation made simple},
journal = {Discrete Applied Mathematics},
volume = {154},
number = {2},
pages = {370--381},
year = {2006},
url = {https://doi.org/10.1016/j.dam.2005.03.020},
doi = {10.1016/j.dam.2005.03.020},
timestamp = {Sun, 28 May 2017 13:22:29 +0200},
biburl = {http://dblp.org/rec/bib/journals/dam/Maurer06},
bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{SW18,
author = {Nigel P. Smart and
Tim Wood},
title = {Error Detection in Monotone Span Programs with Application to Communication-Efficient
Multi-party Computation},
booktitle = {Topics in Cryptology - {CT-RSA} 2019 - The Cryptographers' Track at
the {RSA} Conference 2019, San Francisco, CA, USA, March 4-8, 2019,
Proceedings},
pages = {210--229},
year = {2019},
crossref = {DBLP:conf/ctrsa/2019},
url = {https://doi.org/10.1007/978-3-030-12612-4\_11},
doi = {10.1007/978-3-030-12612-4\_11},
timestamp = {Tue, 26 Feb 2019 12:19:33 +0100},
biburl = {https://dblp.org/rec/bib/conf/ctrsa/SmartW19},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2019,
editor = {Mitsuru Matsui},
title = {Topics in Cryptology - {CT-RSA} 2019 - The Cryptographers' Track at
the {RSA} Conference 2019, San Francisco, CA, USA, March 4-8, 2019,
Proceedings},
series = {Lecture Notes in Computer Science},
volume = {11405},
publisher = {Springer},
year = {2019},
url = {https://doi.org/10.1007/978-3-030-12612-4},
doi = {10.1007/978-3-030-12612-4},
isbn = {978-3-030-12611-7},
timestamp = {Tue, 26 Feb 2019 12:19:33 +0100},
biburl = {https://dblp.org/rec/bib/conf/ctrsa/2019},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{TopGear,
author = {Carsten Baum and
Daniele Cozzo and
Nigel P. Smart},
title = {Using TopGear in Overdrive: {A} More Efficient ZKPoK for {SPDZ}},
booktitle = {Selected Areas in Cryptography - {SAC} 2019 - 26th International Conference,
Waterloo, ON, Canada, August 12-16, 2019, Revised Selected Papers},
pages = {274--302},
year = {2019},
crossref = {DBLP:conf/sacrypt/2019},
url = {https://doi.org/10.1007/978-3-030-38471-5\_12},
doi = {10.1007/978-3-030-38471-5\_12},
timestamp = {Thu, 06 Feb 2020 18:14:47 +0100},
biburl = {https://dblp.org/rec/conf/sacrypt/BaumCS19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2019,
editor = {Kenneth G. Paterson and
Douglas Stebila},
title = {Selected Areas in Cryptography - {SAC} 2019 - 26th International Conference,
Waterloo, ON, Canada, August 12-16, 2019, Revised Selected Papers},
series = {Lecture Notes in Computer Science},
volume = {11959},
publisher = {Springer},
year = {2020},
url = {https://doi.org/10.1007/978-3-030-38471-5},
doi = {10.1007/978-3-030-38471-5},
isbn = {978-3-030-38470-8},
timestamp = {Tue, 14 Jan 2020 14:22:04 +0100},
biburl = {https://dblp.org/rec/conf/sacrypt/2019.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{daBitPaper,
author = {Dragos Rotaru and
Tim Wood},
title = {MArBled Circuits: Mixing Arithmetic and Boolean Circuits with Active
Security},
booktitle = {Progress in Cryptology - {INDOCRYPT} 2019 - 20th International Conference
on Cryptology in India, Hyderabad, India, December 15-18, 2019, Proceedings},
pages = {227--249},
year = {2019},
crossref = {DBLP:conf/indocrypt/2019},
url = {https://doi.org/10.1007/978-3-030-35423-7\_12},
doi = {10.1007/978-3-030-35423-7\_12},
timestamp = {Thu, 12 Dec 2019 16:07:37 +0100},
biburl = {https://dblp.org/rec/bib/conf/indocrypt/Rotaru019},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2019,
editor = {Feng Hao and
Sushmita Ruj and
Sourav Sen Gupta},
title = {Progress in Cryptology - {INDOCRYPT} 2019 - 20th International Conference
on Cryptology in India, Hyderabad, India, December 15-18, 2019, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {11898},
publisher = {Springer},
year = {2019},
url = {https://doi.org/10.1007/978-3-030-35423-7},
doi = {10.1007/978-3-030-35423-7},
isbn = {978-3-030-35422-0},
timestamp = {Thu, 12 Dec 2019 16:07:27 +0100},
biburl = {https://dblp.org/rec/bib/conf/indocrypt/2019},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@misc{GKWY19,
author = {Chun Guo and
Jonathan Katz and
Xiao Wang and
Yu Yu},
title = {Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers},
journal = {Preprint},
year = {2019}
}
@misc{SSCM,
author={{secureSCM}},
title={Deliverable {D9.2}},
howpublished={\url{https://www1.cs.fau.de/filepool/publications/octavian_securescm/SecureSCM-D.9.2.pdf}}
}
@inproceedings{KPR,
author = {Marcel Keller and
Valerio Pastro and
Dragos Rotaru},
title = {Overdrive: Making {SPDZ} Great Again},
booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
Conference on the Theory and Applications of Cryptographic Techniques,
Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}},
pages = {158--189},
year = {2018},
crossref = {DBLP:conf/eurocrypt/2018-3},
url = {https://doi.org/10.1007/978-3-319-78372-7_6},
doi = {10.1007/978-3-319-78372-7_6},
timestamp = {Sat, 05 May 2018 23:05:33 +0200},
biburl = {https://dblp.org/rec/bib/conf/eurocrypt/KellerPR18},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2018-3,
editor = {Jesper Buus Nielsen and
Vincent Rijmen},
title = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
Conference on the Theory and Applications of Cryptographic Techniques,
Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}},
series = {Lecture Notes in Computer Science},
volume = {10822},
publisher = {Springer},
year = {2018},
url = {https://doi.org/10.1007/978-3-319-78372-7},
doi = {10.1007/978-3-319-78372-7},
isbn = {978-3-319-78371-0},
timestamp = {Mon, 16 Apr 2018 14:12:13 +0200},
biburl = {https://dblp.org/rec/bib/conf/eurocrypt/2018-3},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{KRSW,
author = {Marcel Keller and
Dragos Rotaru and
Nigel P. Smart and
Tim Wood},
title = {Reducing Communication Channels in {MPC}},
booktitle = {Security and Cryptography for Networks - 11th International Conference,
{SCN} 2018, Amalfi, Italy, September 5-7, 2018, Proceedings},
pages = {181--199},
year = {2018},
crossref = {DBLP:conf/scn/2018},
url = {https://doi.org/10.1007/978-3-319-98113-0\_10},
doi = {10.1007/978-3-319-98113-0\_10},
timestamp = {Fri, 02 Nov 2018 09:47:09 +0100},
biburl = {https://dblp.org/rec/bib/conf/scn/KellerRSW18},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/scn/2018,
editor = {Dario Catalano and
Roberto De Prisco},
title = {Security and Cryptography for Networks - 11th International Conference,
{SCN} 2018, Amalfi, Italy, September 5-7, 2018, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {11035},
publisher = {Springer},
year = {2018},
url = {https://doi.org/10.1007/978-3-319-98113-0},
doi = {10.1007/978-3-319-98113-0},
isbn = {978-3-319-98112-3},
timestamp = {Wed, 29 Aug 2018 12:19:13 +0200},
biburl = {https://dblp.org/rec/bib/conf/scn/2018},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{GHS12c,
author = {Craig Gentry and
Shai Halevi and
Nigel P. Smart},
title = {Homomorphic Evaluation of the {AES} Circuit},
booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
pages = {850--867},
year = {2012},
crossref = {DBLP:conf/crypto/2012},
url = {https://doi.org/10.1007/978-3-642-32009-5_49},
doi = {10.1007/978-3-642-32009-5_49},
timestamp = {Fri, 26 May 2017 00:50:20 +0200},
biburl = {http://dblp.org/rec/bib/conf/crypto/GentryHS12},
bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{SPDZ,
author = {Ivan Damg{\aa}rd and
Valerio Pastro and
Nigel P. Smart and
Sarah Zakarias},
title = {Multiparty Computation from Somewhat Homomorphic Encryption},
booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
pages = {643--662},
year = {2012},
crossref = {DBLP:conf/crypto/2012},
url = {https://doi.org/10.1007/978-3-642-32009-5_38},
doi = {10.1007/978-3-642-32009-5_38},
timestamp = {Fri, 26 May 2017 00:50:21 +0200},
biburl = {http://dblp.org/rec/bib/conf/crypto/DamgardPSZ12},
bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/crypto/2012,
editor = {Reihaneh Safavi{-}Naini and
Ran Canetti},
title = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
series = {Lecture Notes in Computer Science},
volume = {7417},
publisher = {Springer},
year = {2012},
url = {https://doi.org/10.1007/978-3-642-32009-5},
doi = {10.1007/978-3-642-32009-5},
isbn = {978-3-642-32008-8},
timestamp = {Fri, 26 May 2017 00:50:20 +0200},
biburl = {http://dblp.org/rec/bib/conf/crypto/2012},
bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{SPDZ2,
author = {Ivan Damg{\aa}rd and
Marcel Keller and
Enrique Larraia and
Valerio Pastro and
Peter Scholl and
Nigel P. Smart},
title = {Practical Covertly Secure {MPC} for Dishonest Majority - Or: Breaking
the {SPDZ} Limits},
booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research
in Computer Security, Egham, UK, September 9-13, 2013. Proceedings},
pages = {1--18},
year = {2013},
crossref = {DBLP:conf/esorics/2013},
url = {https://doi.org/10.1007/978-3-642-40203-6_1},
doi = {10.1007/978-3-642-40203-6_1},
timestamp = {Tue, 23 May 2017 01:07:16 +0200},
biburl = {http://dblp.org/rec/bib/conf/esorics/DamgardKLPSS13},
bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/esorics/2013,
editor = {Jason Crampton and
Sushil Jajodia and
Keith Mayes},
title = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research
in Computer Security, Egham, UK, September 9-13, 2013. Proceedings},
series = {Lecture Notes in Computer Science},
volume = {8134},
publisher = {Springer},
year = {2013},
url = {https://doi.org/10.1007/978-3-642-40203-6},
doi = {10.1007/978-3-642-40203-6},
isbn = {978-3-642-40202-9},
timestamp = {Tue, 23 May 2017 01:07:16 +0200},
biburl = {http://dblp.org/rec/bib/conf/esorics/2013},
bibsource = {dblp computer science bibliography, http://dblp.org}
}
@book{Hart:1978:CA:540084,
author = {Hart, John F.},
title = {Computer Approximations},
year = {1978},
isbn = {0882756427},
publisher = {Krieger Publishing Co., Inc.},
address = {Melbourne, FL, USA},
}
@inproceedings{CS10,
author = {Octavian Catrina and
Amitabh Saxena},
title = {Secure Computation with Fixed-Point Numbers},
booktitle = {Financial Cryptography and Data Security, 14th International Conference,
{FC} 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised
Selected Papers},
pages = {35--50},
year = {2010},
crossref = {DBLP:conf/fc/2010},
url = {https://doi.org/10.1007/978-3-642-14577-3_6},
doi = {10.1007/978-3-642-14577-3_6},
timestamp = {Fri, 26 May 2017 00:50:27 +0200},
biburl = {https://dblp.org/rec/bib/conf/fc/CatrinaS10},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2010,
editor = {Radu Sion},
title = {Financial Cryptography and Data Security, 14th International Conference,
{FC} 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised
Selected Papers},
series = {Lecture Notes in Computer Science},
volume = {6052},
publisher = {Springer},
year = {2010},
url = {https://doi.org/10.1007/978-3-642-14577-3},
doi = {10.1007/978-3-642-14577-3},
isbn = {978-3-642-14576-6},
timestamp = {Fri, 26 May 2017 00:50:27 +0200},
biburl = {https://dblp.org/rec/bib/conf/fc/2010},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{CDM00,
author = {Ronald Cramer and
Ivan Damg{\aa}rd and
Ueli M. Maurer},
title = {General Secure Multi-party Computation from any Linear Secret-Sharing
Scheme},
booktitle = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference
on the Theory and Application of Cryptographic Techniques, Bruges,
Belgium, May 14-18, 2000, Proceeding},
pages = {316--334},
year = {2000},
crossref = {DBLP:conf/eurocrypt/2000},
url = {https://doi.org/10.1007/3-540-45539-6_22},
doi = {10.1007/3-540-45539-6_22},
timestamp = {Wed, 24 May 2017 15:40:45 +0200},
biburl = {https://dblp.org/rec/bib/conf/eurocrypt/CramerDM00},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2000,
editor = {Bart Preneel},
title = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference
on the Theory and Application of Cryptographic Techniques, Bruges,
Belgium, May 14-18, 2000, Proceeding},
series = {Lecture Notes in Computer Science},
volume = {1807},
publisher = {Springer},
year = {2000},
url = {https://doi.org/10.1007/3-540-45539-6},
doi = {10.1007/3-540-45539-6},
isbn = {3-540-67517-5},
timestamp = {Wed, 24 May 2017 15:40:45 +0200},
biburl = {https://dblp.org/rec/bib/conf/eurocrypt/2000},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DFKNT06,
author = {Ivan Damg{\aa}rd and
Matthias Fitzi and
Eike Kiltz and
Jesper Buus Nielsen and
Tomas Toft},
title = {Unconditionally Secure Constant-Rounds Multi-party Computation for
Equality, Comparison, Bits and Exponentiation},
booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, {TCC}
2006, New York, NY, USA, March 4-7, 2006, Proceedings},
pages = {285--304},
year = {2006},
crossref = {DBLP:conf/tcc/2006},
url = {https://doi.org/10.1007/11681878_15},
doi = {10.1007/11681878_15},
timestamp = {Mon, 06 Nov 2017 12:14:17 +0100},
biburl = {https://dblp.org/rec/bib/conf/tcc/DamgardFKNT06},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2006,
editor = {Shai Halevi and
Tal Rabin},
title = {Theory of Cryptography, Third Theory of Cryptography Conference, {TCC}
2006, New York, NY, USA, March 4-7, 2006, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {3876},
publisher = {Springer},
year = {2006},
url = {https://doi.org/10.1007/11681878},
doi = {10.1007/11681878},
isbn = {3-540-32731-2},
timestamp = {Tue, 30 May 2017 16:36:52 +0200},
biburl = {https://dblp.org/rec/bib/conf/tcc/2006},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{CH10,
author = {Octavian Catrina and
Sebastiaan de Hoogh},
title = {Improved Primitives for Secure Multiparty Integer Computation},
booktitle = {Security and Cryptography for Networks, 7th International Conference,
{SCN} 2010, Amalfi, Italy, September 13-15, 2010. Proceedings},
pages = {182--199},
year = {2010},
crossref = {DBLP:conf/scn/2010},
url = {https://doi.org/10.1007/978-3-642-15317-4_13},
doi = {10.1007/978-3-642-15317-4_13},
timestamp = {Fri, 26 May 2017 00:49:49 +0200},
biburl = {https://dblp.org/rec/bib/conf/scn/CatrinaH10},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/scn/2010,
editor = {Juan A. Garay and
Roberto De Prisco},
title = {Security and Cryptography for Networks, 7th International Conference,
{SCN} 2010, Amalfi, Italy, September 13-15, 2010. Proceedings},
series = {Lecture Notes in Computer Science},
volume = {6280},
publisher = {Springer},
year = {2010},
url = {https://doi.org/10.1007/978-3-642-15317-4},
doi = {10.1007/978-3-642-15317-4},
isbn = {978-3-642-15316-7},
timestamp = {Fri, 26 May 2017 00:49:49 +0200},
biburl = {https://dblp.org/rec/bib/conf/scn/2010},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{ABZS13,
author = {Mehrdad Aliasgari and
Marina Blanton and
Yihua Zhang and
Aaron Steele},
title = {Secure Computation on Floating Point Numbers},
booktitle = {20th Annual Network and Distributed System Security Symposium, {NDSS}
2013, San Diego, California, USA, February 24-27, 2013},
year = {2013},
crossref = {DBLP:conf/ndss/2013},
url = {https://www.ndss-symposium.org/ndss2013/secure-computation-floating-point-numbers},
timestamp = {Tue, 16 Jan 2018 13:23:48 +0100},
biburl = {https://dblp.org/rec/bib/conf/ndss/AliasgariBZS13},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ndss/2013,
title = {20th Annual Network and Distributed System Security Symposium, {NDSS}
2013, San Diego, California, USA, February 24-27, 2013},
publisher = {The Internet Society},
year = {2013},
url = {https://www.ndss-symposium.org/ndss2013/},
timestamp = {Tue, 16 Jan 2018 13:23:48 +0100},
biburl = {https://dblp.org/rec/bib/conf/ndss/2013},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{Liedel12,
author = {Manuel Liedel},
title = {Secure Distributed Computation of the Square Root and Applications},
booktitle = {Information Security Practice and Experience - 8th International Conference,
{ISPEC} 2012, Hangzhou, China, April 9-12, 2012. Proceedings},
pages = {277--288},
year = {2012},
crossref = {DBLP:conf/ispec/2012},
url = {https://doi.org/10.1007/978-3-642-29101-2_19},
doi = {10.1007/978-3-642-29101-2_19},
timestamp = {Sun, 21 May 2017 00:18:03 +0200},
biburl = {https://dblp.org/rec/bib/conf/ispec/Liedel12},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ispec/2012,
editor = {Mark Dermot Ryan and
Ben Smyth and
Guilin Wang},
title = {Information Security Practice and Experience - 8th International Conference,
{ISPEC} 2012, Hangzhou, China, April 9-12, 2012. Proceedings},
series = {Lecture Notes in Computer Science},
volume = {7232},
publisher = {Springer},
year = {2012},
url = {https://doi.org/10.1007/978-3-642-29101-2},
doi = {10.1007/978-3-642-29101-2},
isbn = {978-3-642-29100-5},
timestamp = {Sun, 21 May 2017 00:18:03 +0200},
biburl = {https://dblp.org/rec/bib/conf/ispec/2012},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{PVW08,
author = {Chris Peikert and
Vinod Vaikuntanathan and
Brent Waters},
title = {A Framework for Efficient and Composable Oblivious Transfer},
booktitle = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International
Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008.
Proceedings},
pages = {554--571},
year = {2008},
crossref = {DBLP:conf/crypto/2008},
url = {https://doi.org/10.1007/978-3-540-85174-5\_31},
doi = {10.1007/978-3-540-85174-5\_31},
timestamp = {Wed, 14 Jun 2017 15:21:25 +0200},
biburl = {https://dblp.org/rec/bib/conf/crypto/PeikertVW08},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2008,
editor = {David A. Wagner},
title = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International
Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008.
Proceedings},
series = {Lecture Notes in Computer Science},
volume = {5157},
publisher = {Springer},
year = {2008},
url = {https://doi.org/10.1007/978-3-540-85174-5},
doi = {10.1007/978-3-540-85174-5},
isbn = {978-3-540-85173-8},
timestamp = {Wed, 14 Jun 2017 15:21:25 +0200},
biburl = {https://dblp.org/rec/bib/conf/crypto/2008},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{CO15,
author = {Tung Chou and
Claudio Orlandi},
title = {The Simplest Protocol for Oblivious Transfer},
booktitle = {Progress in Cryptology - {LATINCRYPT} 2015 - 4th International Conference
on Cryptology and Information Security in Latin America, Guadalajara,
Mexico, August 23-26, 2015, Proceedings},
pages = {40--58},
year = {2015},
crossref = {DBLP:conf/latincrypt/2015},
url = {https://doi.org/10.1007/978-3-319-22174-8\_3},
doi = {10.1007/978-3-319-22174-8\_3},
timestamp = {Wed, 14 Nov 2018 11:00:07 +0100},
biburl = {https://dblp.org/rec/bib/conf/latincrypt/ChouO15},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/latincrypt/2015,
editor = {Kristin E. Lauter and
Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
title = {Progress in Cryptology - {LATINCRYPT} 2015 - 4th International Conference
on Cryptology and Information Security in Latin America, Guadalajara,
Mexico, August 23-26, 2015, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {9230},
publisher = {Springer},
year = {2015},
url = {https://doi.org/10.1007/978-3-319-22174-8},
doi = {10.1007/978-3-319-22174-8},
isbn = {978-3-319-22173-1},
timestamp = {Wed, 14 Nov 2018 11:00:07 +0100},
biburl = {https://dblp.org/rec/bib/conf/latincrypt/2015},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{AC:FKOS15,
author = {Tore Kasper Frederiksen and
Marcel Keller and
Emmanuela Orsini and
Peter Scholl},
title = {A Unified Approach to {MPC} with Preprocessing Using {OT}},
booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
on the Theory and Application of Cryptology and Information Security,
Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
Part {I}},
pages = {711--735},
year = {2015},
crossref = {DBLP:conf/asiacrypt/2015-1},
url = {https://doi.org/10.1007/978-3-662-48797-6\_29},
doi = {10.1007/978-3-662-48797-6\_29},
timestamp = {Fri, 02 Nov 2018 09:40:09 +0100},
biburl = {https://dblp.org/rec/bib/conf/asiacrypt/FrederiksenKOS15},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2015-1,
editor = {Tetsu Iwata and
Jung Hee Cheon},
title = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
on the Theory and Application of Cryptology and Information Security,
Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
Part {I}},
series = {Lecture Notes in Computer Science},
volume = {9452},
publisher = {Springer},
year = {2015},
url = {https://doi.org/10.1007/978-3-662-48797-6},
doi = {10.1007/978-3-662-48797-6},
isbn = {978-3-662-48796-9},
timestamp = {Fri, 19 May 2017 01:26:33 +0200},
biburl = {https://dblp.org/rec/bib/conf/asiacrypt/2015-1},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{C:KelOrsSch15,
author = {Marcel Keller and
Emmanuela Orsini and
Peter Scholl},
title = {Actively Secure {OT} Extension with Optimal Overhead},
booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
pages = {724--741},
year = {2015},
crossref = {DBLP:conf/crypto/2015-1},
url = {https://doi.org/10.1007/978-3-662-47989-6\_35},
doi = {10.1007/978-3-662-47989-6\_35},
timestamp = {Fri, 02 Nov 2018 09:33:50 +0100},
biburl = {https://dblp.org/rec/bib/conf/crypto/KellerOS15},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/2015-1,
editor = {Rosario Gennaro and
Matthew Robshaw},
title = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
series = {Lecture Notes in Computer Science},
volume = {9215},
publisher = {Springer},
year = {2015},
url = {https://doi.org/10.1007/978-3-662-47989-6},
doi = {10.1007/978-3-662-47989-6},
isbn = {978-3-662-47988-9},
timestamp = {Fri, 26 May 2017 00:50:20 +0200},
biburl = {https://dblp.org/rec/bib/conf/crypto/2015-1},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{AC:HazSchSor17,
author = {Carmit Hazay and
Peter Scholl and
Eduardo Soria{-}Vazquez},
title = {Low Cost Constant Round {MPC} Combining {BMR} and Oblivious Transfer},
booktitle = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference
on the Theory and Applications of Cryptology and Information Security,
Hong Kong, China, December 3-7, 2017, Proceedings, Part {I}},
pages = {598--628},
year = {2017},
crossref = {DBLP:conf/asiacrypt/2017-1},
url = {https://doi.org/10.1007/978-3-319-70694-8\_21},
doi = {10.1007/978-3-319-70694-8\_21},
timestamp = {Sat, 24 Nov 2018 11:59:32 +0100},
biburl = {https://dblp.org/rec/bib/conf/asiacrypt/HazaySS17},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2017-1,
editor = {Tsuyoshi Takagi and
Thomas Peyrin},
title = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference
on the Theory and Applications of Cryptology and Information Security,
Hong Kong, China, December 3-7, 2017, Proceedings, Part {I}},
series = {Lecture Notes in Computer Science},
volume = {10624},
publisher = {Springer},
year = {2017},
url = {https://doi.org/10.1007/978-3-319-70694-8},
doi = {10.1007/978-3-319-70694-8},
isbn = {978-3-319-70693-1},
timestamp = {Sat, 24 Nov 2018 11:59:32 +0100},
biburl = {https://dblp.org/rec/bib/conf/asiacrypt/2017-1},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{CCS:WanRanKat17b,
author = {Xiao Wang and
Samuel Ranellucci and
Jonathan Katz},
title = {Global-Scale Secure Multiparty Computation},
booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
November 03, 2017},
pages = {39--56},
year = {2017},
crossref = {DBLP:conf/ccs/2017},
url = {https://doi.org/10.1145/3133956.3133979},
doi = {10.1145/3133956.3133979},
timestamp = {Tue, 06 Nov 2018 11:07:28 +0100},
biburl = {https://dblp.org/rec/bib/conf/ccs/WangRK17a},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2017,
editor = {Bhavani M. Thuraisingham and
David Evans and
Tal Malkin and
Dongyan Xu},
title = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
November 03, 2017},
publisher = {{ACM}},
year = {2017},
url = {https://doi.org/10.1145/3133956},
doi = {10.1145/3133956},
isbn = {978-1-4503-4946-8},
timestamp = {Tue, 06 Nov 2018 11:07:28 +0100},
biburl = {https://dblp.org/rec/bib/conf/ccs/2017},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@misc{SPDZKG,
author = {Dragos Rotaru and
Nigel P. Smart and
Titouan Tanguy and
Frederik Vercauteren and
Tim Wood},
title = {Actively Secure Setup for {SPDZ}},
journal={Preprint},
year={2019}
}
@inproceedings{DBLP:conf/pkc/NishideO07,
author = {Takashi Nishide and
Kazuo Ohta},
title = {Multiparty Computation for Interval, Equality, and Comparison Without
Bit-Decomposition Protocol},
booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference
on Practice and Theory in Public-Key Cryptography, Beijing, China,
April 16-20, 2007, Proceedings},
pages = {343--360},
year = {2007},
crossref = {DBLP:conf/pkc/2007},
url = {https://doi.org/10.1007/978-3-540-71677-8\_23},
doi = {10.1007/978-3-540-71677-8\_23},
timestamp = {Fri, 01 May 2020 18:32:25 +0200},
biburl = {https://dblp.org/rec/conf/pkc/NishideO07.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2007,
editor = {Tatsuaki Okamoto and
Xiaoyun Wang},
title = {Public Key Cryptography - {PKC} 2007, 10th International Conference
on Practice and Theory in Public-Key Cryptography, Beijing, China,
April 16-20, 2007, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {4450},
publisher = {Springer},
year = {2007},
url = {https://doi.org/10.1007/978-3-540-71677-8},
doi = {10.1007/978-3-540-71677-8},
isbn = {978-3-540-71676-1},
timestamp = {Fri, 01 May 2020 18:32:25 +0200},
biburl = {https://dblp.org/rec/conf/pkc/2007.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ArakiBFLLNOWW17,
author = {Toshinori Araki and
Assi Barak and
Jun Furukawa and
Tamar Lichter and
Yehuda Lindell and
Ariel Nof and
Kazuma Ohara and
Adi Watzman and
Or Weinstein},
title = {Optimized Honest-Majority {MPC} for Malicious Adversaries - Breaking
the 1 Billion-Gate Per Second Barrier},
booktitle = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose,
CA, USA, May 22-26, 2017},
pages = {843--862},
publisher = {{IEEE} Computer Society},
year = {2017},
url = {https://doi.org/10.1109/SP.2017.15},
doi = {10.1109/SP.2017.15},
timestamp = {Sat, 19 Oct 2019 20:19:29 +0200},
biburl = {https://dblp.org/rec/conf/sp/ArakiBFLLNOWW17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}