Modulo Reduction for Paillier Encryptions and Application to ...
Multi-Party Computation in 2029: Boom, Bust, or Bonanza?
Scis2014_presen
Nir Bitansky, Ran Canetti, Omer Paneth, Alon Rosen.
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE Bar-Ilan University Gilad Asharov UCLA Abhishek Jain NYU Adriana.
Integrating Data for Analysis, Anonymization, and SHaring Supported by the NIH Grant U54HL108460 to the University of California, San Diego Shuang Wang,
Cryptography and Network Security CSL 759 Shweta Agrawal.
Two Round MPC via Multi-Key FHE Daniel Wichs (Northeastern University) Joint work with Pratyay Mukherjee.
ON CONTINUAL LEAKAGE OF DISCRETE LOG REPRESENTATIONS Shweta Agrawal IIT, Delhi Joint work with Yevgeniy Dodis, Vinod Vaikuntanathan and Daniel Wichs Several.
Tutorial: Multiparty Computation for Honest Majority Ivan Damgård Århus University.
Computational Social Systems: Reputation and Non-Cooperative Computation
Gillian Raab, Chris Dibben, & Paul Burton UNECE-Eurostat Work Session on Statistical Data Confidentiality, Helsinki, 2015 Running an analysis of combined.