Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by Yi-Ting Chiang
Information Theoretical Analysis of Two-Party Secret Computation
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Related publications
Efficiently Making Secure Two-Party Computation Fair
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Secure Two-Party Computation Over Unreliable Channels
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Fundamental Two-Party Quantum Secret Sharing Protocol Without Quantum Entanglement
International Journal of Security and its Applications
Computer Science
Faster Secure Two-Party Computation With Less Memory
Efficient Secure Two-Party Computation Against Malicious Adversaries
Hiding the Input-Size in Secure Two-Party Computation
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Towards Characterizing Complete Fairness in Secure Two-Party Computation
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
The All-Or-Nothing Nature of Two-Party Secure Computation
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Fast and Maliciously Secure Two-Party Computation Using the GPU
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science