Cited By
View all- Boyle ECouteau GGilboa NIshai YLie DMannan MBackes MWang X(2018)Compressing Vector OLEProceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security10.1145/3243734.3243868(896-912)Online publication date: 15-Oct-2018
- Beimel AIshai YKushilevitz E(2005)General constructions for information-theoretic private information retrievalJournal of Computer and System Sciences10.1016/j.jcss.2005.03.00271:2(213-247)Online publication date: 1-Aug-2005
- Cramer RDamgård IIshai Y(2005)Share conversion, pseudorandom secret-sharing and applications to secure computationProceedings of the Second international conference on Theory of Cryptography10.1007/978-3-540-30576-7_19(342-362)Online publication date: 10-Feb-2005
- Show More Cited By