Show simple item record

dc.contributor.authorChen, Yu Long
dc.contributor.authorTessaro, Stefano
dc.date.accessioned2023-07-11T13:09:32Z
dc.date.available2023-06-20T10:39:42Z
dc.date.available2023-07-11T13:09:32Z
dc.date.issued2021
dc.identifier.isbn978-3-030-92074-6
dc.identifier.issn0302-9743
dc.identifier.otherWOS:000927876200010
dc.identifier.urihttps://imec-publications.be/handle/20.500.12860/42061.2
dc.sourceWOS
dc.titleBetter Security-Efficiency Trade-Offs in Permutation-Based Two-Party Computation
dc.typeProceedings paper
dc.contributor.orcidextChen, Yu Long::0000-0002-7158-9639
dc.identifier.doi10.1007/978-3-030-92075-3_10
dc.identifier.eisbn978-3-030-92075-3
dc.source.numberofpages30
dc.source.peerreviewyes
dc.source.beginpage275
dc.source.endpage304
dc.source.conference27th Annual International Conference on Theory and Application of Cryptology and Information Security
dc.source.conferencedateDEC 06-10, 2021
dc.source.conferencelocationSingapore
dc.source.journalLecture Notes in Computer Science
dc.source.volume13091
imec.availabilityPublished - imec


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following collection(s)

Show simple item record

VersionItemDateSummary

*Selected version