Practical covertly secure MPC for dishonest majority–or: breaking the SPDZ limits I Damgård, M Keller, E Larraia, V Pastro, P Scholl, NP Smart Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013 | 623 | 2013 |
MASCOT: faster malicious arithmetic secure computation with oblivious transfer M Keller, E Orsini, P Scholl Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 489 | 2016 |
MP-SPDZ: A versatile framework for multi-party computation M Keller Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020 | 470 | 2020 |
Overdrive: making SPDZ great again M Keller, V Pastro, D Rotaru Annual International Conference on the Theory and Applications of …, 2018 | 351 | 2018 |
Actively secure OT extension with optimal overhead M Keller, E Orsini, P Scholl Annual Cryptology Conference, 724-741, 2015 | 207 | 2015 |
Efficient, oblivious data structures for MPC M Keller, P Scholl Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014 | 168 | 2014 |
New primitives for actively-secure MPC over rings with applications to private machine learning I Damgård, D Escudero, T Frederiksen, M Keller, P Scholl, N Volgushev 2019 IEEE Symposium on Security and Privacy (SP), 1102-1120, 2019 | 161 | 2019 |
Improved primitives for MPC over mixed arithmetic-binary circuits D Escudero, S Ghosh, M Keller, R Rachuri, P Scholl Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020 | 150 | 2020 |
Fantastic four:{Honest-Majority}{Four-Party} secure computation with malicious security A Dalskov, D Escudero, M Keller 30th USENIX Security Symposium (USENIX Security 21), 2183-2200, 2021 | 127 | 2021 |
Secure evaluation of quantized neural networks A Dalskov, D Escudero, M Keller arXiv preprint arXiv:1910.12435, 2019 | 120 | 2019 |
An architecture for practical actively secure MPC with dishonest majority M Keller, P Scholl, NP Smart Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 113 | 2013 |
Implementing AES via an actively/covertly secure dishonest-majority MPC protocol I Damgård, M Keller, E Larraia, C Miles, NP Smart Security and Cryptography for Networks: 8th International Conference, SCN …, 2012 | 90 | 2012 |
Secure Multiparty AES: (Short Paper) I Damgård, M Keller International Conference on Financial Cryptography and Data Security, 367-374, 2010 | 85* | 2010 |
Securing DNSSEC keys via threshold ECDSA from generic MPC A Dalskov, C Orlandi, M Keller, K Shrishak, H Shulman Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020 | 76 | 2020 |
Scale–mamba v1. 14: Documentation A Aly, K Cong, D Cozzo, M Keller, E Orsini, D Rotaru, O Scherer, P Scholl, ... Documentation. pdf, 2021 | 71* | 2021 |
A unified approach to MPC with preprocessing using OT TK Frederiksen, M Keller, E Orsini, P Scholl International conference on the theory and application of cryptology and …, 2015 | 71 | 2015 |
Generalizing the SPDZ compiler for other protocols T Araki, A Barak, J Furukawa, M Keller, Y Lindell, K Ohara, H Tsuchida Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 57 | 2018 |
Faster secure multi-party computation of AES and DES using lookup tables M Keller, E Orsini, D Rotaru, P Scholl, E Soria-Vazquez, S Vivek International Conference on Applied Cryptography and Network Security, 229-249, 2017 | 50 | 2017 |
Secure quantized training for deep learning M Keller, K Sun International Conference on Machine Learning, 10912-10938, 2022 | 49 | 2022 |
Efficient maliciously secure multiparty computation for RAM M Keller, A Yanai Annual International Conference on the Theory and Applications of …, 2018 | 41 | 2018 |