Skip to Navigation
Oregon State University
  • View
  • Edit
  • History
  • Print
College of Engineering

An Annotated Bibliography of Practical Secure Computation


GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits

GMW vs. Yao? Efficient Secure Two-Party Computation with Low Depth Circuits

Thomas Schneider, Michael Zohner
FC 2013 [pdf] [bibtex]


Longer summary goes here

Categories:

Todo

  • Home page
  • All papers, by:
    • .. category
    • .. author names
    • .. publication date
    • .. recently added
    • .. recently updated
  • Glossary
  • About
  • Just getting started in MPC?
  • Guidelines
  • Todo List

Search Papers

Bibliography Categories

  • Circuit constructions & optimizations
  • Cut-and-choose mechanisms
  • Garbling methods
  • Implementations
  • Oblivious transfer extension
  • Protocol paradigms
  • Reference works
  • Security models
  • Special-purpose protocols

Copyright ©2018
Oregon State University
Disclaimer

Page last modified on June 20, 2014, at 11:10 AM