{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T10:13:25Z","timestamp":1729678405385,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,12]]},"DOI":"10.1109\/wifs.2012.6412625","type":"proceedings-article","created":{"date-parts":[[2013,1,25]],"date-time":"2013-01-25T14:44:59Z","timestamp":1359125099000},"page":"55-60","source":"Crossref","is-referenced-by-count":5,"title":["General function evaluation in a STPC setting via piecewise linear approximation"],"prefix":"10.1109","author":[{"given":"Tommaso","family":"Pignata","sequence":"first","affiliation":[]},{"given":"Riccardo","family":"Lazzeretti","sequence":"additional","affiliation":[]},{"given":"Mauro","family":"Barni","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-642-10433-6_1","article-title":"Improved garbled circuit building blocks and applications to auctions and computing minima","author":"kolesnikov","year":"2009","journal-title":"Cryptology and Network Security"},{"key":"17","first-page":"448","article-title":"Efficient oblivious transfer protocols","author":"naor","year":"2001","journal-title":"ACM-SIAM Symposium on Discrete Algorithms (SODA'01)"},{"key":"18","first-page":"97","article-title":"Precomputing oblivious transfer","volume":"963","author":"beaver","year":"1995","journal-title":"LNCS"},{"key":"15","article-title":"Fairplay - A secure two-party computation system","author":"malkhi","year":"2004","journal-title":"USENIX"},{"key":"16","doi-asserted-by":"crossref","first-page":"486","DOI":"10.1007\/978-3-540-70583-3_40","article-title":"Improved garbled circuit: Free XOR gates and applications","volume":"5126","author":"kolesnikov","year":"2008","journal-title":"International Colloquium on Automata Languages and Programming ICALP"},{"key":"13","article-title":"A proof of Yao's protocol for secure two-party computation","author":"lindell","year":"2004","journal-title":"Electronic Colloq on Comp Complexity"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1145\/3812.3818"},{"key":"11","article-title":"From dust to dawn: Practically efficient two-party secure function evaluation protocols and their modular design","author":"kolesnikov","year":"2010","journal-title":"Cryptology ePrint Archive"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1109\/SFCS.1986.25"},{"year":"2009","author":"giry","journal-title":"Cryptographic Key Length Recommendation","key":"21"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1109\/WIFS.2010.5711448"},{"doi-asserted-by":"publisher","key":"20","DOI":"10.1007\/3-540-48910-X_16"},{"key":"2","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1007\/978-3-642-03168-7_14","article-title":"Privacy-preserving face recognition","author":"erkin","year":"2009","journal-title":"Privacy Enhancing Technologies"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1186\/1687-417X-2007-078943"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1145\/2361407.2361435"},{"key":"7","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1007\/978-3-642-13190-5_2","article-title":"Fully homomorphic encryption over the integers","author":"van dijk","year":"2010","journal-title":"Advances in Cryptology - Eurocrypt 2010"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1145\/1536414.1536440"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1109\/WIFS.2010.5711460"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1109\/WIFS.2011.6123132"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1109\/TIFS.2011.2108650"},{"key":"8","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/978-3-642-20465-4_9","article-title":"Implementing gentry's fully-homomorphic encryption scheme","author":"gentry","year":"2011","journal-title":"Advances in Cryptology - EUROCRYPT 2011"}],"event":{"name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","start":{"date-parts":[[2012,12,2]]},"location":"Costa Adeje - Tenerife, Spain","end":{"date-parts":[[2012,12,5]]}},"container-title":["2012 IEEE International Workshop on Information Forensics and Security (WIFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6395850\/6412607\/06412625.pdf?arnumber=6412625","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,8]],"date-time":"2019-07-08T18:30:24Z","timestamp":1562610624000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6412625\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/wifs.2012.6412625","relation":{},"subject":[],"published":{"date-parts":[[2012,12]]}}}