{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T06:38:03Z","timestamp":1764571083411,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031346705"},{"type":"electronic","value":"9783031346712"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-34671-2_22","type":"book-chapter","created":{"date-parts":[[2023,6,20]],"date-time":"2023-06-20T23:02:58Z","timestamp":1687302178000},"page":"307-319","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["New Approach for Sine and Cosine in Secure Fixed-Point Arithmetic"],"prefix":"10.1007","author":[{"given":"Stan","family":"Korzilius","sequence":"first","affiliation":[]},{"given":"Berry","family":"Schoenmakers","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,21]]},"reference":[{"key":"22_CR1","unstructured":"SCALE-MAMBA v1.14 (2021). https:\/\/github.com\/KULeuven-COSIC\/SCALE-MAMBA"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Aly, A., Smart, N.P.: Benchmarking privacy preserved scientific operations. In: Applied Cryptography and Network Security, pp. 509\u2013529 (2019)","DOI":"10.1007\/978-3-030-21568-2_25"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Bar-Ilan, J., Beaver, D.: Non-cryptographic fault-tolerant computing in constant number of rounds of interaction. In: Proceedings of the Eighth Annual ACM Symposium on Principles of Distributed Computing (PODC 1989), pp. 201\u2013209 (1989)","DOI":"10.1145\/72981.72995"},{"key":"22_CR4","unstructured":"Bayatbabolghani, F., Blanton, M., Aliasgari, M., Goodrich, M.T.: Secure fingerprint alignment and matching protocols. arXiv preprint arXiv:1702.03379 (2017)"},{"key":"22_CR5","doi-asserted-by":"publisher","unstructured":"Catrina, O., de Hoogh, S.: Secure multiparty linear programming using fixed-point arithmetic. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 134\u2013150. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-15497-3_9","DOI":"10.1007\/978-3-642-15497-3_9"},{"key":"22_CR6","doi-asserted-by":"publisher","unstructured":"Catrina, O., Saxena, A.: Secure computation with fixed-point numbers. In: Sion, R. (ed.) FC 2010. LNCS, vol. 6052, pp. 35\u201350. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14577-3_6","DOI":"10.1007\/978-3-642-14577-3_6"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Croci, M., Giles, M.B.: Effects of round-to-nearest and stochastic rounding in the numerical solution of the heat equation in low precision. IMA J. Numer. Anal. (2022)","DOI":"10.1093\/imanum\/drac012"},{"key":"22_CR8","doi-asserted-by":"publisher","DOI":"10.1098\/rsos.211631","volume":"9","author":"M Croci","year":"2022","unstructured":"Croci, M., Fasi, M., Higham, N.J., Mary, T., Mikaitis, M.: Stochastic rounding: implementation, error analysis and applications. R. Soc. Open Sci. 9, 211631 (2022)","journal-title":"R. Soc. Open Sci."},{"key":"22_CR9","doi-asserted-by":"publisher","unstructured":"Damg\u00e5rd, I., Fitzi, M., Kiltz, E., Nielsen, J.B., Toft, T.: Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 285\u2013304. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11681878_15","DOI":"10.1007\/11681878_15"},{"key":"22_CR10","doi-asserted-by":"publisher","first-page":"994","DOI":"10.1137\/0222061","volume":"22","author":"J Feigenbaum","year":"1993","unstructured":"Feigenbaum, J., Fortnow, L.: On the random-self-reducibility of complete sets. SIAM J. Comput. 22, 994\u20131005 (1993)","journal-title":"SIAM J. Comput."},{"key":"22_CR11","doi-asserted-by":"publisher","unstructured":"Guajardo, J., Mennink, B., Schoenmakers, B.: Modulo reduction for Paillier encryptions and application to secure statistical analysis. In: Sion, R. (ed.) FC 2010. LNCS, vol. 6052, pp. 375\u2013382. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14577-3_32","DOI":"10.1007\/978-3-642-14577-3_32"},{"key":"22_CR12","volume-title":"Computer Approximations","author":"JF Hart","year":"1978","unstructured":"Hart, J.F.: Computer Approximations. Krieger Publishing Co., Inc., Malabar (1978)"},{"key":"22_CR13","doi-asserted-by":"publisher","unstructured":"Kerik, L., Laud, P., Randmets, J.: Optimizing MPC for robust and scalable integer and floating-point arithmetic. In: Clark, J., Meiklejohn, S., Ryan, P.Y.A., Wallach, D., Brenner, M., Rohloff, K. (eds.) FC 2016. LNCS, vol. 9604, pp. 271\u2013287. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53357-4_18","DOI":"10.1007\/978-3-662-53357-4_18"},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"Na, T., Ko, J.H., Kung, J., Mukhopadhyay, S.: On-chip training of recurrent neural networks with limited numerical precision. In: 2017 International Joint Conference on Neural Networks (IJCNN), pp. 3716\u20133723 (2017)","DOI":"10.1109\/IJCNN.2017.7966324"},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"Naveh, A., Tromer, E.: PhotoProof: cryptographic image authentication for any set of permissible transformations. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 255\u2013271 (2016)","DOI":"10.1109\/SP.2016.23"},{"issue":"4","key":"22_CR16","doi-asserted-by":"publisher","first-page":"1215","DOI":"10.1175\/JCLI-D-21-0343.1","volume":"35","author":"EA Paxton","year":"2022","unstructured":"Paxton, E.A., Chantry, M., Kl\u00f6wer, M., Saffin, L., Palmer, T.: Climate modeling in low precision: effects of both deterministic and stochastic rounding. J. Clim. 35(4), 1215\u20131229 (2022)","journal-title":"J. Clim."},{"key":"22_CR17","unstructured":"Schoenmakers, B: MPyC package for secure multiparty computation in Python. GitHub github.com\/lschoe\/mpyc (2018)"},{"key":"22_CR18","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1109\/TEC.1959.5222693","volume":"8","author":"JE Volder","year":"1959","unstructured":"Volder, J.E.: The CORDIC trigonometric computing technique. IRE Trans. Electron. Comput. 8, 330\u2013334 (1959)","journal-title":"IRE Trans. Electron. Comput."},{"key":"22_CR19","unstructured":"Wang, N., Choi, J., Brand, D., Chen, C.Y., Gopalakrishnan, K.: Training deep neural networks with 8-bit floating point numbers. In: Advances in Neural Information Processing Systems, vol. 31. Curran Associates, Inc. (2018)"}],"container-title":["Lecture Notes in Computer Science","Cyber Security, Cryptology, and Machine Learning"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-34671-2_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T12:22:47Z","timestamp":1710332567000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-34671-2_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031346705","9783031346712"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-34671-2_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"21 June 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CSCML","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Cyber Security, Cryptology, and Machine Learning","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Be'er Sheva","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Israel","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 June 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 June 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cscml2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.cscml.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Open","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"70","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"15","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}