Dragos Rotaru
Dragos Rotaru
Cape Privacy
Geverifieerd e-mailadres voor capeprivacy.com - Homepage
Geciteerd door
Geciteerd door
Overdrive: making SPDZ great again
M Keller, V Pastro, D Rotaru
Annual International Conference on the Theory and Applications of …, 2018
MPC-Friendly Symmetric Key Primitives
L Grassi, C Rechberger, D Rotaru, P Scholl, NP Smart
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
Feistel Structures for MPC, and More
MR Albrecht, L Grassi, L Perrin, S Ramacher, C Rechberger, D Rotaru, ...
European Symposium on Research in Computer Security, 151-171, 2019
EPIC: efficient private image classification (or: learning from the masters)
E Makri, D Rotaru, NP Smart, F Vercauteren
Cryptographers’ Track at the RSA Conference, 473-492, 2019
SCALE and MAMBA documentation (2018)
A Aly, M Keller, E Orsini, D Rotaru, P Scholl, NP Smart, T Wood
MArBled Circuits: Mixing Arithmetic and Boolean Circuits with Active Security
D Rotaru, T Wood
On a generalization of substitution-permutation networks: The HADES design strategy
L Grassi, R Lüftenegger, C Rechberger, D Rotaru, M Schofnegger
Advances in Cryptology–EUROCRYPT 2020 12106, 674, 2020
Faster Secure Multi-Party Computation of AES and DES Using Lookup Tables
M Keller, E Orsini, D Rotaru, P Scholl, E Soria-Vazquez, S Vivek
Applied Cryptography and Network Security: 15th International Conference …, 2017
Zaphod: Efficiently Combining LSSS and Garbled Circuits in SCALE
A Aly, E Orsini, D Rotaru, NP Smart, T Wood
Proceedings of the 7th ACM Workshop on Encrypted Computing & Applied …, 2019
Modes of Operation Suitable for Computing on Encrypted Data
D Rotaru, NP Smart, M Stam
IACR Transactions on Symmetric Cryptology 2017 (3), 294-324, 2017
Reducing communication channels in MPC
M Keller, D Rotaru, NP Smart, T Wood
International Conference on Security and Cryptography for Networks, 181-199, 2018
Actively Secure Setup for SPDZ
D Rotaru, NP Smart, T Tanguy, F Vercauteren, T Wood
Maliciously Secure Matrix Multiplication with Applications to Private Deep Learning
H Chen, M Kim, I Razenshteyn, D Rotaru, Y Song, S Wagh
Rabbit: Efficient Comparison for Secure Multi-Party Computation
E Makri, D Rotaru, F Vercauteren, S Wagh
The return of Eratosthenes: Secure Generation of RSA Moduli using Distributed Sieving
CD de Saint Guilhem, E Makri, D Rotaru, T Tanguy
HERMES: Scalable, Secure, and Privacy-Enhancing Vehicle Access System
I Symeonidis, D Rotaru, MA Mustafa, B Mennink, P Papadimitratos
arXiv preprint arXiv:2101.01950, 2021
Optimizing secure multiparty computation protocols for dishonest majority
DA Rotaru
University of Bristol, 2020
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–17