Keyphrases
Dishonest Majority
100%
Multi-party Computation
71%
Secure multi-party Computation
62%
Compiler
45%
Secure Computation
45%
Secure Protocol
35%
Arithmetic Circuits
33%
Communication Complexity
33%
Pseudorandom Correlation Generators
33%
Three-party
28%
Correlated Randomness
28%
Multiplication Triple
28%
Crypto
28%
Black Box
26%
Zero-knowledge Proof
26%
Finite Ring
22%
Full Security
22%
Short Integer Solution
22%
Lattice-based Cryptography
22%
Fully Secure
22%
Zero-knowledge Arguments
22%
Bandwidth Threshold
22%
Heavy Hitters
22%
DSA Signature
22%
Secret Sharing
22%
Resilient
22%
Pseudorandomness
22%
Threshold Signature
22%
Stragglers
22%
Digital Signature Scheme
22%
Cryptocurrency
22%
Elliptic Curve Digital Signature Algorithm (ECDSA)
22%
Secret Key
22%
Distributed Systems
22%
Threshold ECDSA
22%
Active Security
22%
Low Bandwidth
22%
Preprocessing Techniques
22%
Signature Scheme
22%
Computer Science
22%
Information Theory
20%
Efficient Protocol
20%
MPC-in-the-head
16%
Online Protocol
16%
Malicious Parties
16%
Circuit Size
16%
Radix Sort
15%
Data Sharing
15%
Security Research
15%
32-bit
15%
Computer Science
Secure Protocol
67%
secure multiparty computation
67%
Arithmetic Circuit
45%
Secret Sharing
41%
Communication Complexity
33%
Knowledge Proof
26%
Bandwidth Threshold
22%
Lattice-Based Cryptography
22%
Signature Scheme
22%
Homomorphic Encryption
22%
Online Communication
22%
Integer Solution
22%
Computer Science
22%
Communication Cost
18%
Cyber Security Research
15%
Applied Cryptography
15%
Research Effort
11%
secret sharing scheme
11%
Denial of Service Attack
11%
Data Deduplication
11%
Distributed Systems
11%
Preprocessing Phase
11%
Digital Signature Scheme
11%
Cryptocurrency
11%
Private Set Intersection
11%
Computational Cost
11%
Fundamental Component
11%
Encryption Scheme
11%
Instantiation
11%
Structural Requirement
11%
Popular Approach
11%
Boolean Circuit
11%
Circuit Evaluation
11%
Security Parameter
11%
Security Requirements
11%
Arbitrary Number
7%
Preprocessing
5%