# Get references from DBLP where possible @article{Maurer, author = {Ueli M. Maurer}, title = {Secure multi-party computation made simple}, journal = {Discrete Applied Mathematics}, volume = {154}, number = {2}, pages = {370--381}, year = {2006}, url = {https://doi.org/10.1016/j.dam.2005.03.020}, doi = {10.1016/j.dam.2005.03.020}, timestamp = {Sun, 28 May 2017 13:22:29 +0200}, biburl = {http://dblp.org/rec/bib/journals/dam/Maurer06}, bibsource = {dblp computer science bibliography, http://dblp.org} } @inproceedings{SW18, author = {Nigel P. Smart and Tim Wood}, title = {Error Detection in Monotone Span Programs with Application to Communication-Efficient Multi-party Computation}, booktitle = {Topics in Cryptology - {CT-RSA} 2019 - The Cryptographers' Track at the {RSA} Conference 2019, San Francisco, CA, USA, March 4-8, 2019, Proceedings}, pages = {210--229}, year = {2019}, crossref = {DBLP:conf/ctrsa/2019}, url = {https://doi.org/10.1007/978-3-030-12612-4\_11}, doi = {10.1007/978-3-030-12612-4\_11}, timestamp = {Tue, 26 Feb 2019 12:19:33 +0100}, biburl = {https://dblp.org/rec/bib/conf/ctrsa/SmartW19}, bibsource = {dblp computer science bibliography, https://dblp.org} } @proceedings{DBLP:conf/ctrsa/2019, editor = {Mitsuru Matsui}, title = {Topics in Cryptology - {CT-RSA} 2019 - The Cryptographers' Track at the {RSA} Conference 2019, San Francisco, CA, USA, March 4-8, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11405}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-12612-4}, doi = {10.1007/978-3-030-12612-4}, isbn = {978-3-030-12611-7}, timestamp = {Tue, 26 Feb 2019 12:19:33 +0100}, biburl = {https://dblp.org/rec/bib/conf/ctrsa/2019}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{TopGear, author = {Carsten Baum and Daniele Cozzo and Nigel P. Smart}, title = {Using TopGear in Overdrive: {A} More Efficient ZKPoK for {SPDZ}}, booktitle = {Selected Areas in Cryptography - {SAC} 2019 - 26th International Conference, Waterloo, ON, Canada, August 12-16, 2019, Revised Selected Papers}, pages = {274--302}, year = {2019}, crossref = {DBLP:conf/sacrypt/2019}, url = {https://doi.org/10.1007/978-3-030-38471-5\_12}, doi = {10.1007/978-3-030-38471-5\_12}, timestamp = {Thu, 06 Feb 2020 18:14:47 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/BaumCS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @proceedings{DBLP:conf/sacrypt/2019, editor = {Kenneth G. Paterson and Douglas Stebila}, title = {Selected Areas in Cryptography - {SAC} 2019 - 26th International Conference, Waterloo, ON, Canada, August 12-16, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11959}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-38471-5}, doi = {10.1007/978-3-030-38471-5}, isbn = {978-3-030-38470-8}, timestamp = {Tue, 14 Jan 2020 14:22:04 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{daBitPaper, author = {Dragos Rotaru and Tim Wood}, title = {MArBled Circuits: Mixing Arithmetic and Boolean Circuits with Active Security}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2019 - 20th International Conference on Cryptology in India, Hyderabad, India, December 15-18, 2019, Proceedings}, pages = {227--249}, year = {2019}, crossref = {DBLP:conf/indocrypt/2019}, url = {https://doi.org/10.1007/978-3-030-35423-7\_12}, doi = {10.1007/978-3-030-35423-7\_12}, timestamp = {Thu, 12 Dec 2019 16:07:37 +0100}, biburl = {https://dblp.org/rec/bib/conf/indocrypt/Rotaru019}, bibsource = {dblp computer science bibliography, https://dblp.org} } @proceedings{DBLP:conf/indocrypt/2019, editor = {Feng Hao and Sushmita Ruj and Sourav Sen Gupta}, title = {Progress in Cryptology - {INDOCRYPT} 2019 - 20th International Conference on Cryptology in India, Hyderabad, India, December 15-18, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11898}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-35423-7}, doi = {10.1007/978-3-030-35423-7}, isbn = {978-3-030-35422-0}, timestamp = {Thu, 12 Dec 2019 16:07:27 +0100}, biburl = {https://dblp.org/rec/bib/conf/indocrypt/2019}, bibsource = {dblp computer science bibliography, https://dblp.org} } @misc{GKWY19, author = {Chun Guo and Jonathan Katz and Xiao Wang and Yu Yu}, title = {Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers}, journal = {Preprint}, year = {2019} } @misc{SSCM, author={{secureSCM}}, title={Deliverable {D9.2}}, howpublished={\url{https://www1.cs.fau.de/filepool/publications/octavian_securescm/SecureSCM-D.9.2.pdf}} } @inproceedings{KPR, author = {Marcel Keller and Valerio Pastro and Dragos Rotaru}, title = {Overdrive: Making {SPDZ} Great Again}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}}, pages = {158--189}, year = {2018}, crossref = {DBLP:conf/eurocrypt/2018-3}, url = {https://doi.org/10.1007/978-3-319-78372-7_6}, doi = {10.1007/978-3-319-78372-7_6}, timestamp = {Sat, 05 May 2018 23:05:33 +0200}, biburl = {https://dblp.org/rec/bib/conf/eurocrypt/KellerPR18}, bibsource = {dblp computer science bibliography, https://dblp.org} } @proceedings{DBLP:conf/eurocrypt/2018-3, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10822}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78372-7}, doi = {10.1007/978-3-319-78372-7}, isbn = {978-3-319-78371-0}, timestamp = {Mon, 16 Apr 2018 14:12:13 +0200}, biburl = {https://dblp.org/rec/bib/conf/eurocrypt/2018-3}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{KRSW, author = {Marcel Keller and Dragos Rotaru and Nigel P. Smart and Tim Wood}, title = {Reducing Communication Channels in {MPC}}, booktitle = {Security and Cryptography for Networks - 11th International Conference, {SCN} 2018, Amalfi, Italy, September 5-7, 2018, Proceedings}, pages = {181--199}, year = {2018}, crossref = {DBLP:conf/scn/2018}, url = {https://doi.org/10.1007/978-3-319-98113-0\_10}, doi = {10.1007/978-3-319-98113-0\_10}, timestamp = {Fri, 02 Nov 2018 09:47:09 +0100}, biburl = {https://dblp.org/rec/bib/conf/scn/KellerRSW18}, bibsource = {dblp computer science bibliography, https://dblp.org} } @proceedings{DBLP:conf/scn/2018, editor = {Dario Catalano and Roberto De Prisco}, title = {Security and Cryptography for Networks - 11th International Conference, {SCN} 2018, Amalfi, Italy, September 5-7, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11035}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98113-0}, doi = {10.1007/978-3-319-98113-0}, isbn = {978-3-319-98112-3}, timestamp = {Wed, 29 Aug 2018 12:19:13 +0200}, biburl = {https://dblp.org/rec/bib/conf/scn/2018}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{GHS12c, author = {Craig Gentry and Shai Halevi and Nigel P. Smart}, title = {Homomorphic Evaluation of the {AES} Circuit}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, pages = {850--867}, year = {2012}, crossref = {DBLP:conf/crypto/2012}, url = {https://doi.org/10.1007/978-3-642-32009-5_49}, doi = {10.1007/978-3-642-32009-5_49}, timestamp = {Fri, 26 May 2017 00:50:20 +0200}, biburl = {http://dblp.org/rec/bib/conf/crypto/GentryHS12}, bibsource = {dblp computer science bibliography, http://dblp.org} } @inproceedings{SPDZ, author = {Ivan Damg{\aa}rd and Valerio Pastro and Nigel P. Smart and Sarah Zakarias}, title = {Multiparty Computation from Somewhat Homomorphic Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, pages = {643--662}, year = {2012}, crossref = {DBLP:conf/crypto/2012}, url = {https://doi.org/10.1007/978-3-642-32009-5_38}, doi = {10.1007/978-3-642-32009-5_38}, timestamp = {Fri, 26 May 2017 00:50:21 +0200}, biburl = {http://dblp.org/rec/bib/conf/crypto/DamgardPSZ12}, bibsource = {dblp computer science bibliography, http://dblp.org} } @proceedings{DBLP:conf/crypto/2012, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5}, doi = {10.1007/978-3-642-32009-5}, isbn = {978-3-642-32008-8}, timestamp = {Fri, 26 May 2017 00:50:20 +0200}, biburl = {http://dblp.org/rec/bib/conf/crypto/2012}, bibsource = {dblp computer science bibliography, http://dblp.org} } @inproceedings{SPDZ2, author = {Ivan Damg{\aa}rd and Marcel Keller and Enrique Larraia and Valerio Pastro and Peter Scholl and Nigel P. Smart}, title = {Practical Covertly Secure {MPC} for Dishonest Majority - Or: Breaking the {SPDZ} Limits}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, pages = {1--18}, year = {2013}, crossref = {DBLP:conf/esorics/2013}, url = {https://doi.org/10.1007/978-3-642-40203-6_1}, doi = {10.1007/978-3-642-40203-6_1}, timestamp = {Tue, 23 May 2017 01:07:16 +0200}, biburl = {http://dblp.org/rec/bib/conf/esorics/DamgardKLPSS13}, bibsource = {dblp computer science bibliography, http://dblp.org} } @proceedings{DBLP:conf/esorics/2013, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6}, doi = {10.1007/978-3-642-40203-6}, isbn = {978-3-642-40202-9}, timestamp = {Tue, 23 May 2017 01:07:16 +0200}, biburl = {http://dblp.org/rec/bib/conf/esorics/2013}, bibsource = {dblp computer science bibliography, http://dblp.org} } @book{Hart:1978:CA:540084, author = {Hart, John F.}, title = {Computer Approximations}, year = {1978}, isbn = {0882756427}, publisher = {Krieger Publishing Co., Inc.}, address = {Melbourne, FL, USA}, } @inproceedings{CS10, author = {Octavian Catrina and Amitabh Saxena}, title = {Secure Computation with Fixed-Point Numbers}, booktitle = {Financial Cryptography and Data Security, 14th International Conference, {FC} 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised Selected Papers}, pages = {35--50}, year = {2010}, crossref = {DBLP:conf/fc/2010}, url = {https://doi.org/10.1007/978-3-642-14577-3_6}, doi = {10.1007/978-3-642-14577-3_6}, timestamp = {Fri, 26 May 2017 00:50:27 +0200}, biburl = {https://dblp.org/rec/bib/conf/fc/CatrinaS10}, bibsource = {dblp computer science bibliography, https://dblp.org} } @proceedings{DBLP:conf/fc/2010, editor = {Radu Sion}, title = {Financial Cryptography and Data Security, 14th International Conference, {FC} 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6052}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14577-3}, doi = {10.1007/978-3-642-14577-3}, isbn = {978-3-642-14576-6}, timestamp = {Fri, 26 May 2017 00:50:27 +0200}, biburl = {https://dblp.org/rec/bib/conf/fc/2010}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{CDM00, author = {Ronald Cramer and Ivan Damg{\aa}rd and Ueli M. Maurer}, title = {General Secure Multi-party Computation from any Linear Secret-Sharing Scheme}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000, Proceeding}, pages = {316--334}, year = {2000}, crossref = {DBLP:conf/eurocrypt/2000}, url = {https://doi.org/10.1007/3-540-45539-6_22}, doi = {10.1007/3-540-45539-6_22}, timestamp = {Wed, 24 May 2017 15:40:45 +0200}, biburl = {https://dblp.org/rec/bib/conf/eurocrypt/CramerDM00}, bibsource = {dblp computer science bibliography, https://dblp.org} } @proceedings{DBLP:conf/eurocrypt/2000, editor = {Bart Preneel}, title = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1807}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45539-6}, doi = {10.1007/3-540-45539-6}, isbn = {3-540-67517-5}, timestamp = {Wed, 24 May 2017 15:40:45 +0200}, biburl = {https://dblp.org/rec/bib/conf/eurocrypt/2000}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DFKNT06, author = {Ivan Damg{\aa}rd and Matthias Fitzi and Eike Kiltz and Jesper Buus Nielsen and Tomas Toft}, title = {Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation}, booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, {TCC} 2006, New York, NY, USA, March 4-7, 2006, Proceedings}, pages = {285--304}, year = {2006}, crossref = {DBLP:conf/tcc/2006}, url = {https://doi.org/10.1007/11681878_15}, doi = {10.1007/11681878_15}, timestamp = {Mon, 06 Nov 2017 12:14:17 +0100}, biburl = {https://dblp.org/rec/bib/conf/tcc/DamgardFKNT06}, bibsource = {dblp computer science bibliography, https://dblp.org} } @proceedings{DBLP:conf/tcc/2006, editor = {Shai Halevi and Tal Rabin}, title = {Theory of Cryptography, Third Theory of Cryptography Conference, {TCC} 2006, New York, NY, USA, March 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3876}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11681878}, doi = {10.1007/11681878}, isbn = {3-540-32731-2}, timestamp = {Tue, 30 May 2017 16:36:52 +0200}, biburl = {https://dblp.org/rec/bib/conf/tcc/2006}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{CH10, author = {Octavian Catrina and Sebastiaan de Hoogh}, title = {Improved Primitives for Secure Multiparty Integer Computation}, booktitle = {Security and Cryptography for Networks, 7th International Conference, {SCN} 2010, Amalfi, Italy, September 13-15, 2010. Proceedings}, pages = {182--199}, year = {2010}, crossref = {DBLP:conf/scn/2010}, url = {https://doi.org/10.1007/978-3-642-15317-4_13}, doi = {10.1007/978-3-642-15317-4_13}, timestamp = {Fri, 26 May 2017 00:49:49 +0200}, biburl = {https://dblp.org/rec/bib/conf/scn/CatrinaH10}, bibsource = {dblp computer science bibliography, https://dblp.org} } @proceedings{DBLP:conf/scn/2010, editor = {Juan A. Garay and Roberto De Prisco}, title = {Security and Cryptography for Networks, 7th International Conference, {SCN} 2010, Amalfi, Italy, September 13-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6280}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15317-4}, doi = {10.1007/978-3-642-15317-4}, isbn = {978-3-642-15316-7}, timestamp = {Fri, 26 May 2017 00:49:49 +0200}, biburl = {https://dblp.org/rec/bib/conf/scn/2010}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{ABZS13, author = {Mehrdad Aliasgari and Marina Blanton and Yihua Zhang and Aaron Steele}, title = {Secure Computation on Floating Point Numbers}, booktitle = {20th Annual Network and Distributed System Security Symposium, {NDSS} 2013, San Diego, California, USA, February 24-27, 2013}, year = {2013}, crossref = {DBLP:conf/ndss/2013}, url = {https://www.ndss-symposium.org/ndss2013/secure-computation-floating-point-numbers}, timestamp = {Tue, 16 Jan 2018 13:23:48 +0100}, biburl = {https://dblp.org/rec/bib/conf/ndss/AliasgariBZS13}, bibsource = {dblp computer science bibliography, https://dblp.org} } @proceedings{DBLP:conf/ndss/2013, title = {20th Annual Network and Distributed System Security Symposium, {NDSS} 2013, San Diego, California, USA, February 24-27, 2013}, publisher = {The Internet Society}, year = {2013}, url = {https://www.ndss-symposium.org/ndss2013/}, timestamp = {Tue, 16 Jan 2018 13:23:48 +0100}, biburl = {https://dblp.org/rec/bib/conf/ndss/2013}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{Liedel12, author = {Manuel Liedel}, title = {Secure Distributed Computation of the Square Root and Applications}, booktitle = {Information Security Practice and Experience - 8th International Conference, {ISPEC} 2012, Hangzhou, China, April 9-12, 2012. Proceedings}, pages = {277--288}, year = {2012}, crossref = {DBLP:conf/ispec/2012}, url = {https://doi.org/10.1007/978-3-642-29101-2_19}, doi = {10.1007/978-3-642-29101-2_19}, timestamp = {Sun, 21 May 2017 00:18:03 +0200}, biburl = {https://dblp.org/rec/bib/conf/ispec/Liedel12}, bibsource = {dblp computer science bibliography, https://dblp.org} } @proceedings{DBLP:conf/ispec/2012, editor = {Mark Dermot Ryan and Ben Smyth and Guilin Wang}, title = {Information Security Practice and Experience - 8th International Conference, {ISPEC} 2012, Hangzhou, China, April 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7232}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29101-2}, doi = {10.1007/978-3-642-29101-2}, isbn = {978-3-642-29100-5}, timestamp = {Sun, 21 May 2017 00:18:03 +0200}, biburl = {https://dblp.org/rec/bib/conf/ispec/2012}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{PVW08, author = {Chris Peikert and Vinod Vaikuntanathan and Brent Waters}, title = {A Framework for Efficient and Composable Oblivious Transfer}, booktitle = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings}, pages = {554--571}, year = {2008}, crossref = {DBLP:conf/crypto/2008}, url = {https://doi.org/10.1007/978-3-540-85174-5\_31}, doi = {10.1007/978-3-540-85174-5\_31}, timestamp = {Wed, 14 Jun 2017 15:21:25 +0200}, biburl = {https://dblp.org/rec/bib/conf/crypto/PeikertVW08}, bibsource = {dblp computer science bibliography, https://dblp.org} } @proceedings{DBLP:conf/crypto/2008, editor = {David A. Wagner}, title = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5157}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85174-5}, doi = {10.1007/978-3-540-85174-5}, isbn = {978-3-540-85173-8}, timestamp = {Wed, 14 Jun 2017 15:21:25 +0200}, biburl = {https://dblp.org/rec/bib/conf/crypto/2008}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{CO15, author = {Tung Chou and Claudio Orlandi}, title = {The Simplest Protocol for Oblivious Transfer}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2015 - 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings}, pages = {40--58}, year = {2015}, crossref = {DBLP:conf/latincrypt/2015}, url = {https://doi.org/10.1007/978-3-319-22174-8\_3}, doi = {10.1007/978-3-319-22174-8\_3}, timestamp = {Wed, 14 Nov 2018 11:00:07 +0100}, biburl = {https://dblp.org/rec/bib/conf/latincrypt/ChouO15}, bibsource = {dblp computer science bibliography, https://dblp.org} } @proceedings{DBLP:conf/latincrypt/2015, editor = {Kristin E. Lauter and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, title = {Progress in Cryptology - {LATINCRYPT} 2015 - 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9230}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22174-8}, doi = {10.1007/978-3-319-22174-8}, isbn = {978-3-319-22173-1}, timestamp = {Wed, 14 Nov 2018 11:00:07 +0100}, biburl = {https://dblp.org/rec/bib/conf/latincrypt/2015}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{AC:FKOS15, author = {Tore Kasper Frederiksen and Marcel Keller and Emmanuela Orsini and Peter Scholl}, title = {A Unified Approach to {MPC} with Preprocessing Using {OT}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part {I}}, pages = {711--735}, year = {2015}, crossref = {DBLP:conf/asiacrypt/2015-1}, url = {https://doi.org/10.1007/978-3-662-48797-6\_29}, doi = {10.1007/978-3-662-48797-6\_29}, timestamp = {Fri, 02 Nov 2018 09:40:09 +0100}, biburl = {https://dblp.org/rec/bib/conf/asiacrypt/FrederiksenKOS15}, bibsource = {dblp computer science bibliography, https://dblp.org} } @proceedings{DBLP:conf/asiacrypt/2015-1, editor = {Tetsu Iwata and Jung Hee Cheon}, title = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9452}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48797-6}, doi = {10.1007/978-3-662-48797-6}, isbn = {978-3-662-48796-9}, timestamp = {Fri, 19 May 2017 01:26:33 +0200}, biburl = {https://dblp.org/rec/bib/conf/asiacrypt/2015-1}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{C:KelOrsSch15, author = {Marcel Keller and Emmanuela Orsini and Peter Scholl}, title = {Actively Secure {OT} Extension with Optimal Overhead}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, pages = {724--741}, year = {2015}, crossref = {DBLP:conf/crypto/2015-1}, url = {https://doi.org/10.1007/978-3-662-47989-6\_35}, doi = {10.1007/978-3-662-47989-6\_35}, timestamp = {Fri, 02 Nov 2018 09:33:50 +0100}, biburl = {https://dblp.org/rec/bib/conf/crypto/KellerOS15}, bibsource = {dblp computer science bibliography, https://dblp.org} } @proceedings{DBLP:conf/crypto/2015-1, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6}, doi = {10.1007/978-3-662-47989-6}, isbn = {978-3-662-47988-9}, timestamp = {Fri, 26 May 2017 00:50:20 +0200}, biburl = {https://dblp.org/rec/bib/conf/crypto/2015-1}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{AC:HazSchSor17, author = {Carmit Hazay and Peter Scholl and Eduardo Soria{-}Vazquez}, title = {Low Cost Constant Round {MPC} Combining {BMR} and Oblivious Transfer}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part {I}}, pages = {598--628}, year = {2017}, crossref = {DBLP:conf/asiacrypt/2017-1}, url = {https://doi.org/10.1007/978-3-319-70694-8\_21}, doi = {10.1007/978-3-319-70694-8\_21}, timestamp = {Sat, 24 Nov 2018 11:59:32 +0100}, biburl = {https://dblp.org/rec/bib/conf/asiacrypt/HazaySS17}, bibsource = {dblp computer science bibliography, https://dblp.org} } @proceedings{DBLP:conf/asiacrypt/2017-1, editor = {Tsuyoshi Takagi and Thomas Peyrin}, title = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10624}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70694-8}, doi = {10.1007/978-3-319-70694-8}, isbn = {978-3-319-70693-1}, timestamp = {Sat, 24 Nov 2018 11:59:32 +0100}, biburl = {https://dblp.org/rec/bib/conf/asiacrypt/2017-1}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{CCS:WanRanKat17b, author = {Xiao Wang and Samuel Ranellucci and Jonathan Katz}, title = {Global-Scale Secure Multiparty Computation}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {39--56}, year = {2017}, crossref = {DBLP:conf/ccs/2017}, url = {https://doi.org/10.1145/3133956.3133979}, doi = {10.1145/3133956.3133979}, timestamp = {Tue, 06 Nov 2018 11:07:28 +0100}, biburl = {https://dblp.org/rec/bib/conf/ccs/WangRK17a}, bibsource = {dblp computer science bibliography, https://dblp.org} } @proceedings{DBLP:conf/ccs/2017, editor = {Bhavani M. Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956}, doi = {10.1145/3133956}, isbn = {978-1-4503-4946-8}, timestamp = {Tue, 06 Nov 2018 11:07:28 +0100}, biburl = {https://dblp.org/rec/bib/conf/ccs/2017}, bibsource = {dblp computer science bibliography, https://dblp.org} } @misc{SPDZKG, author = {Dragos Rotaru and Nigel P. Smart and Titouan Tanguy and Frederik Vercauteren and Tim Wood}, title = {Actively Secure Setup for {SPDZ}}, journal={Preprint}, year={2019} } @inproceedings{DBLP:conf/pkc/NishideO07, author = {Takashi Nishide and Kazuo Ohta}, title = {Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, pages = {343--360}, year = {2007}, crossref = {DBLP:conf/pkc/2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_23}, doi = {10.1007/978-3-540-71677-8\_23}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/NishideO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @proceedings{DBLP:conf/pkc/2007, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8}, doi = {10.1007/978-3-540-71677-8}, isbn = {978-3-540-71676-1}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/sp/ArakiBFLLNOWW17, author = {Toshinori Araki and Assi Barak and Jun Furukawa and Tamar Lichter and Yehuda Lindell and Ariel Nof and Kazuma Ohara and Adi Watzman and Or Weinstein}, title = {Optimized Honest-Majority {MPC} for Malicious Adversaries - Breaking the 1 Billion-Gate Per Second Barrier}, booktitle = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose, CA, USA, May 22-26, 2017}, pages = {843--862}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SP.2017.15}, doi = {10.1109/SP.2017.15}, timestamp = {Sat, 19 Oct 2019 20:19:29 +0200}, biburl = {https://dblp.org/rec/conf/sp/ArakiBFLLNOWW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }