Publication:

Better Security-Efficiency Trade-Offs in Permutation-Based Two-Party Computation

 
dc.contributor.authorChen, Yu Long
dc.contributor.authorTessaro, Stefano
dc.contributor.orcidextChen, Yu Long::0000-0002-7158-9639
dc.date.accessioned2023-07-11T13:09:32Z
dc.date.available2023-06-20T10:39:42Z
dc.date.available2023-07-11T13:09:32Z
dc.date.issued2021
dc.identifier.doi10.1007/978-3-030-92075-3_10
dc.identifier.eisbn978-3-030-92075-3
dc.identifier.isbn978-3-030-92074-6
dc.identifier.issn0302-9743
dc.identifier.urihttps://imec-publications.be/handle/20.500.12860/42061
dc.publisherSPRINGER INTERNATIONAL PUBLISHING AG
dc.source.beginpage275
dc.source.conference27th Annual International Conference on Theory and Application of Cryptology and Information Security
dc.source.conferencedateDEC 06-10, 2021
dc.source.conferencelocationSingapore
dc.source.endpage304
dc.source.journalLecture Notes in Computer Science
dc.source.numberofpages30
dc.source.volume13091
dc.subject.keywordsCIPHER
dc.subject.keywordsKEY
dc.title

Better Security-Efficiency Trade-Offs in Permutation-Based Two-Party Computation

dc.typeProceedings paper
dspace.entity.typePublication
Files
Publication available in collections: