scale_documentation 0.1.2

structured SCALE assembly documentation
Documentation
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
# Get references from DBLP where possible

@article{Maurer,
  author    = {Ueli M. Maurer},
  title     = {Secure multi-party computation made simple},
  journal   = {Discrete Applied Mathematics},
  volume    = {154},
  number    = {2},
  pages     = {370--381},
  year      = {2006},
  url       = {https://doi.org/10.1016/j.dam.2005.03.020},
  doi       = {10.1016/j.dam.2005.03.020},
  timestamp = {Sun, 28 May 2017 13:22:29 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/dam/Maurer06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}




@inproceedings{SW18,
  author    = {Nigel P. Smart and
               Tim Wood},
  title     = {Error Detection in Monotone Span Programs with Application to Communication-Efficient
               Multi-party Computation},
  booktitle = {Topics in Cryptology - {CT-RSA} 2019 - The Cryptographers' Track at
               the {RSA} Conference 2019, San Francisco, CA, USA, March 4-8, 2019,
               Proceedings},
  pages     = {210--229},
  year      = {2019},
  crossref  = {DBLP:conf/ctrsa/2019},
  url       = {https://doi.org/10.1007/978-3-030-12612-4\_11},
  doi       = {10.1007/978-3-030-12612-4\_11},
  timestamp = {Tue, 26 Feb 2019 12:19:33 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ctrsa/SmartW19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}

@proceedings{DBLP:conf/ctrsa/2019,
  editor    = {Mitsuru Matsui},
  title     = {Topics in Cryptology - {CT-RSA} 2019 - The Cryptographers' Track at
               the {RSA} Conference 2019, San Francisco, CA, USA, March 4-8, 2019,
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11405},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-12612-4},
  doi       = {10.1007/978-3-030-12612-4},
  isbn      = {978-3-030-12611-7},
  timestamp = {Tue, 26 Feb 2019 12:19:33 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ctrsa/2019},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}




@inproceedings{TopGear,
  author    = {Carsten Baum and
               Daniele Cozzo and
               Nigel P. Smart},
  title     = {Using TopGear in Overdrive: {A} More Efficient ZKPoK for {SPDZ}},
  booktitle = {Selected Areas in Cryptography - {SAC} 2019 - 26th International Conference,
               Waterloo, ON, Canada, August 12-16, 2019, Revised Selected Papers},
  pages     = {274--302},
  year      = {2019},
  crossref  = {DBLP:conf/sacrypt/2019},
  url       = {https://doi.org/10.1007/978-3-030-38471-5\_12},
  doi       = {10.1007/978-3-030-38471-5\_12},
  timestamp = {Thu, 06 Feb 2020 18:14:47 +0100},
  biburl    = {https://dblp.org/rec/conf/sacrypt/BaumCS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}

@proceedings{DBLP:conf/sacrypt/2019,
  editor    = {Kenneth G. Paterson and
               Douglas Stebila},
  title     = {Selected Areas in Cryptography - {SAC} 2019 - 26th International Conference,
               Waterloo, ON, Canada, August 12-16, 2019, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {11959},
  publisher = {Springer},
  year      = {2020},
  url       = {https://doi.org/10.1007/978-3-030-38471-5},
  doi       = {10.1007/978-3-030-38471-5},
  isbn      = {978-3-030-38470-8},
  timestamp = {Tue, 14 Jan 2020 14:22:04 +0100},
  biburl    = {https://dblp.org/rec/conf/sacrypt/2019.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}





@inproceedings{daBitPaper,
  author    = {Dragos Rotaru and
               Tim Wood},
  title     = {MArBled Circuits: Mixing Arithmetic and Boolean Circuits with Active
               Security},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2019 - 20th International Conference
               on Cryptology in India, Hyderabad, India, December 15-18, 2019, Proceedings},
  pages     = {227--249},
  year      = {2019},
  crossref  = {DBLP:conf/indocrypt/2019},
  url       = {https://doi.org/10.1007/978-3-030-35423-7\_12},
  doi       = {10.1007/978-3-030-35423-7\_12},
  timestamp = {Thu, 12 Dec 2019 16:07:37 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/Rotaru019},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}

@proceedings{DBLP:conf/indocrypt/2019,
  editor    = {Feng Hao and
               Sushmita Ruj and
               Sourav Sen Gupta},
  title     = {Progress in Cryptology - {INDOCRYPT} 2019 - 20th International Conference
               on Cryptology in India, Hyderabad, India, December 15-18, 2019, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11898},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-35423-7},
  doi       = {10.1007/978-3-030-35423-7},
  isbn      = {978-3-030-35422-0},
  timestamp = {Thu, 12 Dec 2019 16:07:27 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/2019},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}




@misc{GKWY19,
  author    = {Chun Guo and
               Jonathan Katz and
               Xiao Wang and
               Yu Yu},
  title     = {Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers},
  journal   = {Preprint},
  year      = {2019}
}


@misc{SSCM,
  author={{secureSCM}},
  title={Deliverable {D9.2}},
  howpublished={\url{https://www1.cs.fau.de/filepool/publications/octavian_securescm/SecureSCM-D.9.2.pdf}}
}

@inproceedings{KPR,
  author    = {Marcel Keller and
               Valerio Pastro and
               Dragos Rotaru},
  title     = {Overdrive: Making {SPDZ} Great Again},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}},
  pages     = {158--189},
  year      = {2018},
  crossref  = {DBLP:conf/eurocrypt/2018-3},
  url       = {https://doi.org/10.1007/978-3-319-78372-7_6},
  doi       = {10.1007/978-3-319-78372-7_6},
  timestamp = {Sat, 05 May 2018 23:05:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/KellerPR18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}

@proceedings{DBLP:conf/eurocrypt/2018-3,
  editor    = {Jesper Buus Nielsen and
               Vincent Rijmen},
  title     = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10822},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-78372-7},
  doi       = {10.1007/978-3-319-78372-7},
  isbn      = {978-3-319-78371-0},
  timestamp = {Mon, 16 Apr 2018 14:12:13 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2018-3},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}




@inproceedings{KRSW,
  author    = {Marcel Keller and
               Dragos Rotaru and
               Nigel P. Smart and
               Tim Wood},
  title     = {Reducing Communication Channels in {MPC}},
  booktitle = {Security and Cryptography for Networks - 11th International Conference,
               {SCN} 2018, Amalfi, Italy, September 5-7, 2018, Proceedings},
  pages     = {181--199},
  year      = {2018},
  crossref  = {DBLP:conf/scn/2018},
  url       = {https://doi.org/10.1007/978-3-319-98113-0\_10},
  doi       = {10.1007/978-3-319-98113-0\_10},
  timestamp = {Fri, 02 Nov 2018 09:47:09 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/scn/KellerRSW18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}

@proceedings{DBLP:conf/scn/2018,
  editor    = {Dario Catalano and
               Roberto De Prisco},
  title     = {Security and Cryptography for Networks - 11th International Conference,
               {SCN} 2018, Amalfi, Italy, September 5-7, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11035},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-98113-0},
  doi       = {10.1007/978-3-319-98113-0},
  isbn      = {978-3-319-98112-3},
  timestamp = {Wed, 29 Aug 2018 12:19:13 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/scn/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}




@inproceedings{GHS12c,
  author    = {Craig Gentry and
               Shai Halevi and
               Nigel P. Smart},
  title     = {Homomorphic Evaluation of the {AES} Circuit},
  booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  pages     = {850--867},
  year      = {2012},
  crossref  = {DBLP:conf/crypto/2012},
  url       = {https://doi.org/10.1007/978-3-642-32009-5_49},
  doi       = {10.1007/978-3-642-32009-5_49},
  timestamp = {Fri, 26 May 2017 00:50:20 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/GentryHS12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}


@inproceedings{SPDZ,
  author    = {Ivan Damg{\aa}rd and
               Valerio Pastro and
               Nigel P. Smart and
               Sarah Zakarias},
  title     = {Multiparty Computation from Somewhat Homomorphic Encryption},
  booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  pages     = {643--662},
  year      = {2012},
  crossref  = {DBLP:conf/crypto/2012},
  url       = {https://doi.org/10.1007/978-3-642-32009-5_38},
  doi       = {10.1007/978-3-642-32009-5_38},
  timestamp = {Fri, 26 May 2017 00:50:21 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/DamgardPSZ12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}

@proceedings{DBLP:conf/crypto/2012,
  editor    = {Reihaneh Safavi{-}Naini and
               Ran Canetti},
  title     = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7417},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-32009-5},
  doi       = {10.1007/978-3-642-32009-5},
  isbn      = {978-3-642-32008-8},
  timestamp = {Fri, 26 May 2017 00:50:20 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/crypto/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}



@inproceedings{SPDZ2,
  author    = {Ivan Damg{\aa}rd and
               Marcel Keller and
               Enrique Larraia and
               Valerio Pastro and
               Peter Scholl and
               Nigel P. Smart},
  title     = {Practical Covertly Secure {MPC} for Dishonest Majority - Or: Breaking
               the {SPDZ} Limits},
  booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research
               in Computer Security, Egham, UK, September 9-13, 2013. Proceedings},
  pages     = {1--18},
  year      = {2013},
  crossref  = {DBLP:conf/esorics/2013},
  url       = {https://doi.org/10.1007/978-3-642-40203-6_1},
  doi       = {10.1007/978-3-642-40203-6_1},
  timestamp = {Tue, 23 May 2017 01:07:16 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/esorics/DamgardKLPSS13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}

@proceedings{DBLP:conf/esorics/2013,
  editor    = {Jason Crampton and
               Sushil Jajodia and
               Keith Mayes},
  title     = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research
               in Computer Security, Egham, UK, September 9-13, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8134},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-40203-6},
  doi       = {10.1007/978-3-642-40203-6},
  isbn      = {978-3-642-40202-9},
  timestamp = {Tue, 23 May 2017 01:07:16 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/esorics/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}

@book{Hart:1978:CA:540084,
 author = {Hart, John F.},
 title = {Computer Approximations},
 year = {1978},
 isbn = {0882756427},
 publisher = {Krieger Publishing Co., Inc.},
 address = {Melbourne, FL, USA},
}




@inproceedings{CS10,
  author    = {Octavian Catrina and
               Amitabh Saxena},
  title     = {Secure Computation with Fixed-Point Numbers},
  booktitle = {Financial Cryptography and Data Security, 14th International Conference,
               {FC} 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised
               Selected Papers},
  pages     = {35--50},
  year      = {2010},
  crossref  = {DBLP:conf/fc/2010},
  url       = {https://doi.org/10.1007/978-3-642-14577-3_6},
  doi       = {10.1007/978-3-642-14577-3_6},
  timestamp = {Fri, 26 May 2017 00:50:27 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/CatrinaS10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}

@proceedings{DBLP:conf/fc/2010,
  editor    = {Radu Sion},
  title     = {Financial Cryptography and Data Security, 14th International Conference,
               {FC} 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6052},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-14577-3},
  doi       = {10.1007/978-3-642-14577-3},
  isbn      = {978-3-642-14576-6},
  timestamp = {Fri, 26 May 2017 00:50:27 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fc/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}




@inproceedings{CDM00,
  author    = {Ronald Cramer and
               Ivan Damg{\aa}rd and
               Ueli M. Maurer},
  title     = {General Secure Multi-party Computation from any Linear Secret-Sharing
               Scheme},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference
               on the Theory and Application of Cryptographic Techniques, Bruges,
               Belgium, May 14-18, 2000, Proceeding},
  pages     = {316--334},
  year      = {2000},
  crossref  = {DBLP:conf/eurocrypt/2000},
  url       = {https://doi.org/10.1007/3-540-45539-6_22},
  doi       = {10.1007/3-540-45539-6_22},
  timestamp = {Wed, 24 May 2017 15:40:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/CramerDM00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}

@proceedings{DBLP:conf/eurocrypt/2000,
  editor    = {Bart Preneel},
  title     = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference
               on the Theory and Application of Cryptographic Techniques, Bruges,
               Belgium, May 14-18, 2000, Proceeding},
  series    = {Lecture Notes in Computer Science},
  volume    = {1807},
  publisher = {Springer},
  year      = {2000},
  url       = {https://doi.org/10.1007/3-540-45539-6},
  doi       = {10.1007/3-540-45539-6},
  isbn      = {3-540-67517-5},
  timestamp = {Wed, 24 May 2017 15:40:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/2000},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}





@inproceedings{DFKNT06,
  author    = {Ivan Damg{\aa}rd and
               Matthias Fitzi and
               Eike Kiltz and
               Jesper Buus Nielsen and
               Tomas Toft},
  title     = {Unconditionally Secure Constant-Rounds Multi-party Computation for
               Equality, Comparison, Bits and Exponentiation},
  booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, {TCC}
               2006, New York, NY, USA, March 4-7, 2006, Proceedings},
  pages     = {285--304},
  year      = {2006},
  crossref  = {DBLP:conf/tcc/2006},
  url       = {https://doi.org/10.1007/11681878_15},
  doi       = {10.1007/11681878_15},
  timestamp = {Mon, 06 Nov 2017 12:14:17 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/DamgardFKNT06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}

@proceedings{DBLP:conf/tcc/2006,
  editor    = {Shai Halevi and
               Tal Rabin},
  title     = {Theory of Cryptography, Third Theory of Cryptography Conference, {TCC}
               2006, New York, NY, USA, March 4-7, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3876},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11681878},
  doi       = {10.1007/11681878},
  isbn      = {3-540-32731-2},
  timestamp = {Tue, 30 May 2017 16:36:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tcc/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}



@inproceedings{CH10,
  author    = {Octavian Catrina and
               Sebastiaan de Hoogh},
  title     = {Improved Primitives for Secure Multiparty Integer Computation},
  booktitle = {Security and Cryptography for Networks, 7th International Conference,
               {SCN} 2010, Amalfi, Italy, September 13-15, 2010. Proceedings},
  pages     = {182--199},
  year      = {2010},
  crossref  = {DBLP:conf/scn/2010},
  url       = {https://doi.org/10.1007/978-3-642-15317-4_13},
  doi       = {10.1007/978-3-642-15317-4_13},
  timestamp = {Fri, 26 May 2017 00:49:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/scn/CatrinaH10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}

@proceedings{DBLP:conf/scn/2010,
  editor    = {Juan A. Garay and
               Roberto De Prisco},
  title     = {Security and Cryptography for Networks, 7th International Conference,
               {SCN} 2010, Amalfi, Italy, September 13-15, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6280},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-15317-4},
  doi       = {10.1007/978-3-642-15317-4},
  isbn      = {978-3-642-15316-7},
  timestamp = {Fri, 26 May 2017 00:49:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/scn/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}








@inproceedings{ABZS13,
  author    = {Mehrdad Aliasgari and
               Marina Blanton and
               Yihua Zhang and
               Aaron Steele},
  title     = {Secure Computation on Floating Point Numbers},
  booktitle = {20th Annual Network and Distributed System Security Symposium, {NDSS}
               2013, San Diego, California, USA, February 24-27, 2013},
  year      = {2013},
  crossref  = {DBLP:conf/ndss/2013},
  url       = {https://www.ndss-symposium.org/ndss2013/secure-computation-floating-point-numbers},
  timestamp = {Tue, 16 Jan 2018 13:23:48 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/AliasgariBZS13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}

@proceedings{DBLP:conf/ndss/2013,
  title     = {20th Annual Network and Distributed System Security Symposium, {NDSS}
               2013, San Diego, California, USA, February 24-27, 2013},
  publisher = {The Internet Society},
  year      = {2013},
  url       = {https://www.ndss-symposium.org/ndss2013/},
  timestamp = {Tue, 16 Jan 2018 13:23:48 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}





@inproceedings{Liedel12,
  author    = {Manuel Liedel},
  title     = {Secure Distributed Computation of the Square Root and Applications},
  booktitle = {Information Security Practice and Experience - 8th International Conference,
               {ISPEC} 2012, Hangzhou, China, April 9-12, 2012. Proceedings},
  pages     = {277--288},
  year      = {2012},
  crossref  = {DBLP:conf/ispec/2012},
  url       = {https://doi.org/10.1007/978-3-642-29101-2_19},
  doi       = {10.1007/978-3-642-29101-2_19},
  timestamp = {Sun, 21 May 2017 00:18:03 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ispec/Liedel12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}

@proceedings{DBLP:conf/ispec/2012,
  editor    = {Mark Dermot Ryan and
               Ben Smyth and
               Guilin Wang},
  title     = {Information Security Practice and Experience - 8th International Conference,
               {ISPEC} 2012, Hangzhou, China, April 9-12, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7232},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-29101-2},
  doi       = {10.1007/978-3-642-29101-2},
  isbn      = {978-3-642-29100-5},
  timestamp = {Sun, 21 May 2017 00:18:03 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ispec/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}




@inproceedings{PVW08,
  author    = {Chris Peikert and
               Vinod Vaikuntanathan and
               Brent Waters},
  title     = {A Framework for Efficient and Composable Oblivious Transfer},
  booktitle = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008.
               Proceedings},
  pages     = {554--571},
  year      = {2008},
  crossref  = {DBLP:conf/crypto/2008},
  url       = {https://doi.org/10.1007/978-3-540-85174-5\_31},
  doi       = {10.1007/978-3-540-85174-5\_31},
  timestamp = {Wed, 14 Jun 2017 15:21:25 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/PeikertVW08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}

@proceedings{DBLP:conf/crypto/2008,
  editor    = {David A. Wagner},
  title     = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008.
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5157},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-85174-5},
  doi       = {10.1007/978-3-540-85174-5},
  isbn      = {978-3-540-85173-8},
  timestamp = {Wed, 14 Jun 2017 15:21:25 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}




@inproceedings{CO15,
  author    = {Tung Chou and
               Claudio Orlandi},
  title     = {The Simplest Protocol for Oblivious Transfer},
  booktitle = {Progress in Cryptology - {LATINCRYPT} 2015 - 4th International Conference
               on Cryptology and Information Security in Latin America, Guadalajara,
               Mexico, August 23-26, 2015, Proceedings},
  pages     = {40--58},
  year      = {2015},
  crossref  = {DBLP:conf/latincrypt/2015},
  url       = {https://doi.org/10.1007/978-3-319-22174-8\_3},
  doi       = {10.1007/978-3-319-22174-8\_3},
  timestamp = {Wed, 14 Nov 2018 11:00:07 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/latincrypt/ChouO15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}

@proceedings{DBLP:conf/latincrypt/2015,
  editor    = {Kristin E. Lauter and
               Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  title     = {Progress in Cryptology - {LATINCRYPT} 2015 - 4th International Conference
               on Cryptology and Information Security in Latin America, Guadalajara,
               Mexico, August 23-26, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9230},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-22174-8},
  doi       = {10.1007/978-3-319-22174-8},
  isbn      = {978-3-319-22173-1},
  timestamp = {Wed, 14 Nov 2018 11:00:07 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/latincrypt/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}




@inproceedings{AC:FKOS15,
  author    = {Tore Kasper Frederiksen and
               Marcel Keller and
               Emmanuela Orsini and
               Peter Scholl},
  title     = {A Unified Approach to {MPC} with Preprocessing Using {OT}},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
               on the Theory and Application of Cryptology and Information Security,
               Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
               Part {I}},
  pages     = {711--735},
  year      = {2015},
  crossref  = {DBLP:conf/asiacrypt/2015-1},
  url       = {https://doi.org/10.1007/978-3-662-48797-6\_29},
  doi       = {10.1007/978-3-662-48797-6\_29},
  timestamp = {Fri, 02 Nov 2018 09:40:09 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/FrederiksenKOS15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}

@proceedings{DBLP:conf/asiacrypt/2015-1,
  editor    = {Tetsu Iwata and
               Jung Hee Cheon},
  title     = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
               on the Theory and Application of Cryptology and Information Security,
               Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
               Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9452},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-48797-6},
  doi       = {10.1007/978-3-662-48797-6},
  isbn      = {978-3-662-48796-9},
  timestamp = {Fri, 19 May 2017 01:26:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2015-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}





@inproceedings{C:KelOrsSch15,
  author    = {Marcel Keller and
               Emmanuela Orsini and
               Peter Scholl},
  title     = {Actively Secure {OT} Extension with Optimal Overhead},
  booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  pages     = {724--741},
  year      = {2015},
  crossref  = {DBLP:conf/crypto/2015-1},
  url       = {https://doi.org/10.1007/978-3-662-47989-6\_35},
  doi       = {10.1007/978-3-662-47989-6\_35},
  timestamp = {Fri, 02 Nov 2018 09:33:50 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/KellerOS15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}

@proceedings{DBLP:conf/crypto/2015-1,
  editor    = {Rosario Gennaro and
               Matthew Robshaw},
  title     = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9215},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-47989-6},
  doi       = {10.1007/978-3-662-47989-6},
  isbn      = {978-3-662-47988-9},
  timestamp = {Fri, 26 May 2017 00:50:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/2015-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}





@inproceedings{AC:HazSchSor17,
  author    = {Carmit Hazay and
               Peter Scholl and
               Eduardo Soria{-}Vazquez},
  title     = {Low Cost Constant Round {MPC} Combining {BMR} and Oblivious Transfer},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference
               on the Theory and Applications of Cryptology and Information Security,
               Hong Kong, China, December 3-7, 2017, Proceedings, Part {I}},
  pages     = {598--628},
  year      = {2017},
  crossref  = {DBLP:conf/asiacrypt/2017-1},
  url       = {https://doi.org/10.1007/978-3-319-70694-8\_21},
  doi       = {10.1007/978-3-319-70694-8\_21},
  timestamp = {Sat, 24 Nov 2018 11:59:32 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/HazaySS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}

@proceedings{DBLP:conf/asiacrypt/2017-1,
  editor    = {Tsuyoshi Takagi and
               Thomas Peyrin},
  title     = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference
               on the Theory and Applications of Cryptology and Information Security,
               Hong Kong, China, December 3-7, 2017, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10624},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-70694-8},
  doi       = {10.1007/978-3-319-70694-8},
  isbn      = {978-3-319-70693-1},
  timestamp = {Sat, 24 Nov 2018 11:59:32 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2017-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}





@inproceedings{CCS:WanRanKat17b,
  author    = {Xiao Wang and
               Samuel Ranellucci and
               Jonathan Katz},
  title     = {Global-Scale Secure Multiparty Computation},
  booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
               November 03, 2017},
  pages     = {39--56},
  year      = {2017},
  crossref  = {DBLP:conf/ccs/2017},
  url       = {https://doi.org/10.1145/3133956.3133979},
  doi       = {10.1145/3133956.3133979},
  timestamp = {Tue, 06 Nov 2018 11:07:28 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/WangRK17a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}

@proceedings{DBLP:conf/ccs/2017,
  editor    = {Bhavani M. Thuraisingham and
               David Evans and
               Tal Malkin and
               Dongyan Xu},
  title     = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
               November 03, 2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {https://doi.org/10.1145/3133956},
  doi       = {10.1145/3133956},
  isbn      = {978-1-4503-4946-8},
  timestamp = {Tue, 06 Nov 2018 11:07:28 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}


@misc{SPDZKG,
        author    = {Dragos Rotaru and
                     Nigel P. Smart and
                     Titouan Tanguy and
                     Frederik Vercauteren and
                     Tim Wood},
       title     = {Actively Secure Setup for {SPDZ}},
       journal={Preprint},
       year={2019}
}



@inproceedings{DBLP:conf/pkc/NishideO07,
  author    = {Takashi Nishide and
               Kazuo Ohta},
  title     = {Multiparty Computation for Interval, Equality, and Comparison Without
               Bit-Decomposition Protocol},
  booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference
               on Practice and Theory in Public-Key Cryptography, Beijing, China,
               April 16-20, 2007, Proceedings},
  pages     = {343--360},
  year      = {2007},
  crossref  = {DBLP:conf/pkc/2007},
  url       = {https://doi.org/10.1007/978-3-540-71677-8\_23},
  doi       = {10.1007/978-3-540-71677-8\_23},
  timestamp = {Fri, 01 May 2020 18:32:25 +0200},
  biburl    = {https://dblp.org/rec/conf/pkc/NishideO07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}

@proceedings{DBLP:conf/pkc/2007,
  editor    = {Tatsuaki Okamoto and
               Xiaoyun Wang},
  title     = {Public Key Cryptography - {PKC} 2007, 10th International Conference
               on Practice and Theory in Public-Key Cryptography, Beijing, China,
               April 16-20, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4450},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-71677-8},
  doi       = {10.1007/978-3-540-71677-8},
  isbn      = {978-3-540-71676-1},
  timestamp = {Fri, 01 May 2020 18:32:25 +0200},
  biburl    = {https://dblp.org/rec/conf/pkc/2007.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}


@inproceedings{DBLP:conf/sp/ArakiBFLLNOWW17,
  author    = {Toshinori Araki and
               Assi Barak and
               Jun Furukawa and
               Tamar Lichter and
               Yehuda Lindell and
               Ariel Nof and
               Kazuma Ohara and
               Adi Watzman and
               Or Weinstein},
  title     = {Optimized Honest-Majority {MPC} for Malicious Adversaries - Breaking
               the 1 Billion-Gate Per Second Barrier},
  booktitle = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose,
               CA, USA, May 22-26, 2017},
  pages     = {843--862},
  publisher = {{IEEE} Computer Society},
  year      = {2017},
  url       = {https://doi.org/10.1109/SP.2017.15},
  doi       = {10.1109/SP.2017.15},
  timestamp = {Sat, 19 Oct 2019 20:19:29 +0200},
  biburl    = {https://dblp.org/rec/conf/sp/ArakiBFLLNOWW17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}