{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T23:45:07Z","timestamp":1769298307850,"version":"3.49.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,5]]},"DOI":"10.1109\/icassp.2011.5947691","type":"proceedings-article","created":{"date-parts":[[2011,7,13]],"date-time":"2011-07-13T11:50:30Z","timestamp":1310557830000},"page":"5848-5851","source":"Crossref","is-referenced-by-count":35,"title":["Is multiparty computation any good in practice?"],"prefix":"10.1109","author":[{"given":"Claudio","family":"Orlandi","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19571-6_20"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20465-4_11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455804"},{"key":"ref14","article-title":"Fairplay - secure two-party computation system","author":"malkhi","year":"2004"},{"key":"ref15","article-title":"Asynchronous multiparty computation: Theory and implementation","author":"damg\u00e5rd","year":"2009","journal-title":"PKC"},{"key":"ref16","article-title":"Sharemind: A framework for fast privacy-preserving computations","author":"bogdanov","year":"2008","journal-title":"ESORICS"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866358"},{"key":"ref18","article-title":"Secure two-party computation is practical","author":"pinkas","year":"2009","journal-title":"ASIACRYPT"},{"key":"ref19","article-title":"A new approach to practical active-secure two-party computation","author":"nielsen","year":"2011","journal-title":"Manuscript"},{"key":"ref4","article-title":"Modular design of efficient secure function evaluation protocols","author":"kolesnikov","year":"2010","journal-title":"Cryptology EPrint Archive Report 2010\/499"},{"key":"ref3","article-title":"Secure multiparty computation goes live","author":"bogetoft","year":"2009","journal-title":"Financial Cryptography"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88702-7_5"},{"key":"ref5","article-title":"ECRYPT II","year":"2010","journal-title":"Ecrypt Yearly Report on Algorithms and Keysizes"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2001.959888"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03356-8_32"},{"key":"ref2","article-title":"Introduction to Modern Cryptography","author":"katz","year":"2008","journal-title":"Chapman & Hall\/Crc"},{"key":"ref1","article-title":"Foundations of cryptography, Volume II, Basic Applications","author":"goldreich","year":"2004","journal-title":"Cambridge University Press"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79228-4_1"}],"event":{"name":"ICASSP 2011 - 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","location":"Prague, Czech Republic","start":{"date-parts":[[2011,5,22]]},"end":{"date-parts":[[2011,5,27]]}},"container-title":["2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5916934\/5946226\/05947691.pdf?arnumber=5947691","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,20]],"date-time":"2017-03-20T23:33:54Z","timestamp":1490052834000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5947691\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,5]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icassp.2011.5947691","relation":{},"subject":[],"published":{"date-parts":[[2011,5]]}}}