Skip to Navigation
Oregon State University
  • View
  • Edit
  • History
  • Print
College of Engineering

An Annotated Bibliography of Practical Secure Computation


Billion-Gate Secure Computation with Malicious Adversaries

Billion-Gate Secure Computation with Malicious Adversaries

Benjamin Kreuter, abhi shelat, Chih-Hao Shen
USENIX 2012 [pdf]


Longer summary goes here

Categories:

Todo Implementations

  • Home page
  • All papers, by:
    • .. category
    • .. author names
    • .. publication date
    • .. recently added
    • .. recently updated
  • Glossary
  • About
  • Just getting started in MPC?
  • Guidelines
  • Todo List

Search Papers

Bibliography Categories

  • Circuit constructions & optimizations
  • Cut-and-choose mechanisms
  • Garbling methods
  • Implementations
  • Oblivious transfer extension
  • Protocol paradigms
  • Reference works
  • Security models
  • Special-purpose protocols

Copyright ©2018
Oregon State University
Disclaimer

Page last modified on August 17, 2014, at 10:07 PM