Dragos Rotaru
Dragos Rotaru
Cape Privacy
Geverifieerd e-mailadres voor capeprivacy.com - Homepage
Geciteerd door
Geciteerd door
Overdrive: making SPDZ great again
M Keller, V Pastro, D Rotaru
Annual International Conference on the Theory and Applications of …, 2018
MPC-Friendly Symmetric Key Primitives
L Grassi, C Rechberger, D Rotaru, P Scholl, NP Smart
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
Feistel Structures for MPC, and More
MR Albrecht, L Grassi, L Perrin, S Ramacher, C Rechberger, D Rotaru, ...
European Symposium on Research in Computer Security, 151-171, 2019
EPIC: efficient private image classification (or: learning from the masters)
E Makri, D Rotaru, NP Smart, F Vercauteren
Cryptographers’ Track at the RSA Conference, 473-492, 2019
SCALE and MAMBA documentation (2018)
A Aly, M Keller, E Orsini, D Rotaru, P Scholl, NP Smart, T Wood
MArBled Circuits: Mixing Arithmetic and Boolean Circuits with Active Security
D Rotaru, T Wood
On a generalization of substitution-permutation networks: The HADES design strategy
L Grassi, R Lüftenegger, C Rechberger, D Rotaru, M Schofnegger
Advances in Cryptology–EUROCRYPT 2020 12106, 674, 2020
Zaphod: Efficiently Combining LSSS and Garbled Circuits in SCALE
A Aly, E Orsini, D Rotaru, NP Smart, T Wood
Proceedings of the 7th ACM Workshop on Encrypted Computing & Applied …, 2019
Faster Secure Multi-Party Computation of AES and DES Using Lookup Tables
M Keller, E Orsini, D Rotaru, P Scholl, E Soria-Vazquez, S Vivek
Applied Cryptography and Network Security: 15th International Conference …, 2017
Modes of Operation Suitable for Computing on Encrypted Data
D Rotaru, NP Smart, M Stam
IACR Transactions on Symmetric Cryptology 2017 (3), 294-324, 2017
Reducing communication channels in MPC
M Keller, D Rotaru, NP Smart, T Wood
International Conference on Security and Cryptography for Networks, 181-199, 2018
Actively Secure Setup for SPDZ
D Rotaru, NP Smart, T Tanguy, F Vercauteren, T Wood
Maliciously Secure Matrix Multiplication with Applications to Private Deep Learning
H Chen, M Kim, I Razenshteyn, D Rotaru, Y Song, S Wagh
Rabbit: Efficient Comparison for Secure Multi-Party Computation
E Makri, D Rotaru, F Vercauteren, S Wagh
The return of Eratosthenes: Secure Generation of RSA Moduli using Distributed Sieving
CD de Saint Guilhem, E Makri, D Rotaru, T Tanguy
HERMES: Scalable, Secure, and Privacy-Enhancing Vehicular Sharing-Access System
I Symeonidis, D Rotaru, MA Mustafa, B Mennink, B Preneel, ...
IEEE Internet of Things Journal, 2021
Optimizing secure multiparty computation protocols for dishonest majority
DA Rotaru
University of Bristol, 2020
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–17