Notice
This item has not yet been validated by imec staff.
Notice
This is not the latest version of this item. The latest version can be found at: https://imec-prod.atmire.com/handle/20.500.12860/42061.2
Better Security-Efficiency Trade-Offs in Permutation-Based Two-Party Computation
| dc.contributor.author | Chen, Yu Long | |
| dc.contributor.author | Tessaro, Stefano | |
| dc.date.accessioned | 2023-06-20T10:39:42Z | |
| dc.date.available | 2023-06-20T10:39:42Z | |
| dc.date.issued | 2021 | |
| dc.identifier.isbn | 978-3-030-92074-6 | |
| dc.identifier.issn | 0302-9743 | |
| dc.identifier.other | WOS:000927876200010 | |
| dc.identifier.uri | https://imec-publications.be/handle/20.500.12860/42061 | |
| dc.source | WOS | |
| dc.title | Better Security-Efficiency Trade-Offs in Permutation-Based Two-Party Computation | |
| dc.type | Proceedings paper | |
| dc.contributor.orcidext | Chen, Yu Long::0000-0002-7158-9639 | |
| dc.identifier.doi | 10.1007/978-3-030-92075-3_10 | |
| dc.identifier.eisbn | 978-3-030-92075-3 | |
| dc.source.numberofpages | 30 | |
| dc.source.peerreview | yes | |
| dc.source.beginpage | 275 | |
| dc.source.endpage | 304 | |
| dc.source.conference | 27th Annual International Conference on Theory and Application of Cryptology and Information Security | |
| dc.source.conferencedate | DEC 06-10, 2021 | |
| dc.source.volume | 13091 | |
| imec.availability | Under review |
Files in this item
| Files | Size | Format | View |
|---|---|---|---|
|
There are no files associated with this item. |
|||