Cited By
View all- Colombo SNikitin KCorrigan-Gibbs HWu DFord BCalandrino JTroncoso C(2023)Authenticated private information retrievalProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620452(3835-3851)Online publication date: 9-Aug-2023
- Choi JTian DHernandez GPatton CMood BShrimpton TButler KTraynor PGalbraith SRussello GSusilo WGollmann DKirda ELiang Z(2019)A Hybrid Approach to Secure Function Evaluation using SGXProceedings of the 2019 ACM Asia Conference on Computer and Communications Security10.1145/3321705.3329835(100-113)Online publication date: 2-Jul-2019
- Hazay CMikkelsen GRabin TToft TNicolosi A(2019)Efficient RSA Key Generation and Threshold Paillier in the Two-Party SettingJournal of Cryptology10.1007/s00145-017-9275-732:2(265-323)Online publication date: 1-Apr-2019
- Show More Cited By