SCiFI
From MaRDI portal
Cited in
(7)- \texttt{MOTIF}: (almost) free branching in GMW. Via vector-scalar multiplication
- Computationally secure pattern matching in the presence of malicious adversaries
- Proving Correctness and Security of Two-Party Computation Implemented in Java in Presence of a Semi-honest Sender
- Two quantum protocols for secure Hamming distance computation
- Kangaroo
- A Lattice-Based Approach to Privacy-Preserving Biometric Authentication Without Relying on Trusted Third Parties
- 5PM: secure pattern matching
This page was built for software: SCiFI