This site contains annotated bibliography entries of research papers in practical secure computation, with the goal of being a resource for new and old researchers interested in the topic. Initially, the site will focus on two-party computation using garbled circuits and cut-and-choose techniques. See this page for more information about this project.
Disclaimer: The current selection of papers is somewhat arbitrary, so do not use a paper's presence/absence on this site as any indicator of that paper's importance. The site is very much a work in progress, and writing bibliography entries is somewhat of a "spare time" activity for its maintainer! There are perhaps hundreds of great papers that are egregiously missing from the site and should be included. In the mean time, I would gladly accept corrections of factual errors, as well as contributed bibliography entries! Check out the guidelines for bibliography entries.
View all 40 papers:
Quick list (tooltips contain title / author):
[AL10] [ALSZ13] [AO12] [B13] [BHKR13] [BHR12] [CKKZ12] [FJNOO13] [GKKKMRV12] [HKE12] [HL10] [HSEKS11] [IKNP03] [IKOS07] [JKO13] [K05] [KK12] [KK13] [KMR14] [KS06] [KS06b] [KS08] [KS08b] [KSS12] [L13] [LP07] [LP08] [LP09] [LP12] [LPS08] [MF06] [MNPS04] [MR13] [PSSW09] [S12] [SS11] [SS13] [SZ13] [V76] [Y86]