{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T10:58:43Z","timestamp":1761994723219,"version":"build-2065373602"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,24]],"date-time":"2016-10-24T00:00:00Z","timestamp":1477267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Estonain Research Council","award":["IUT27-1"],"award-info":[{"award-number":["IUT27-1"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2976749.2978348","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T12:46:35Z","timestamp":1477399595000},"page":"553-564","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Alternative Implementations of Secure Real Numbers"],"prefix":"10.1145","author":[{"given":"Vassil","family":"Dimitrov","sequence":"first","affiliation":[{"name":"University of Calgary, Calgary, Canada"}]},{"given":"Liisi","family":"Kerik","sequence":"additional","affiliation":[{"name":"Cybernetica, Tartu, Estonia"}]},{"given":"Toomas","family":"Krips","sequence":"additional","affiliation":[{"name":"STACC, Tartu, Estonia"}]},{"given":"Jaak","family":"Randmets","sequence":"additional","affiliation":[{"name":"Cybernetica, Tartu, Estonia"}]},{"given":"Jan","family":"Willemson","sequence":"additional","affiliation":[{"name":"Cybernetica, STACC, Tartu, Estonia"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"NDSS","author":"Aliasgari Mehrdad","year":"2013","unstructured":"Mehrdad Aliasgari , Marina Blanton , Yihua Zhang , and Aaron Steele . Secure computation on floating point numbers . In NDSS , 2013 . Mehrdad Aliasgari, Marina Blanton, Yihua Zhang, and Aaron Steele. Secure computation on floating point numbers. In NDSS, 2013."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382279"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62213"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MARK.1979.8817296"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15317-4_13"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1888881.1888893"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14577-3_6"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62214"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2037252.2037271"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28420"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-014-0271-8"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53357-4_18"},{"key":"e_1_3_2_1_15_1","first-page":"179","volume-title":"Information Security: 17th International Conference, ISC 2014","volume":"8783","author":"Krips Toomas","year":"2014","unstructured":"Toomas Krips and Jan Willemson . Hybrid model of fixed and floating point numbers in secure multiparty computations . In Information Security: 17th International Conference, ISC 2014 , volume 8783 of LNCS, pages 179 -- 197 . Springer , 2014 . Toomas Krips and Jan Willemson. Hybrid model of fixed and floating point numbers in secure multiparty computations. In Information Security: 17th International Conference, ISC 2014, volume 8783 of LNCS, pages 179--197. Springer, 2014."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-30303-1_5"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813664"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-008-9036-8"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2015.13"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48051-9_13"},{"key":"e_1_3_2_1_21_1","volume-title":"Industry Tap","author":"Schilling David Russell","year":"2013","unstructured":"David Russell Schilling . Knowledge doubling every 12 months, soon to be every 12 hours . Industry Tap , 2013 . http:\/\/www.industrytap.com\/knowledge-doubling-every-12-months-soon-to-be-every-12-hours\/3950. David Russell Schilling. Knowledge doubling every 12 months, soon to be every 12 hours. Industry Tap, 2013. http:\/\/www.industrytap.com\/knowledge-doubling-every-12-months-soon-to-be-every-12-hours\/3950."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/1382436.1382751"}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Vienna Austria","acronym":"CCS'16"},"container-title":["Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978348","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978348","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:40:14Z","timestamp":1750218014000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978348"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":21,"alternative-id":["10.1145\/2976749.2978348","10.1145\/2976749"],"URL":"https:\/\/doi.org\/10.1145\/2976749.2978348","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}