Notice

This item has not yet been validated by imec staff.

Notice

This is not the latest version of this item. The latest version can be found at: https://imec-prod.atmire.com/handle/20.500.12860/42061.2

Show simple item record

dc.contributor.authorChen, Yu Long
dc.contributor.authorTessaro, Stefano
dc.date.accessioned2023-06-20T10:39:42Z
dc.date.available2023-06-20T10:39:42Z
dc.date.issued2021
dc.identifier.isbn978-3-030-92074-6
dc.identifier.issn0302-9743
dc.identifier.otherWOS:000927876200010
dc.identifier.urihttps://imec-publications.be/handle/20.500.12860/42061
dc.sourceWOS
dc.titleBetter Security-Efficiency Trade-Offs in Permutation-Based Two-Party Computation
dc.typeProceedings paper
dc.contributor.orcidextChen, Yu Long::0000-0002-7158-9639
dc.identifier.doi10.1007/978-3-030-92075-3_10
dc.identifier.eisbn978-3-030-92075-3
dc.source.numberofpages30
dc.source.peerreviewyes
dc.source.beginpage275
dc.source.endpage304
dc.source.conference27th Annual International Conference on Theory and Application of Cryptology and Information Security
dc.source.conferencedateDEC 06-10, 2021
dc.source.volume13091
imec.availabilityUnder review


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following collection(s)

Show simple item record

VersionItemDateSummary

*Selected version