{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:55:48Z","timestamp":1773510948616,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,24]],"date-time":"2016-10-24T00:00:00Z","timestamp":1477267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"ERC","award":["ERC-2010-AdG- 267188-CRIPTO"],"award-info":[{"award-number":["ERC-2010-AdG- 267188-CRIPTO"]}]},{"name":"DARPA & SSC Pacific","award":["N66001- 15-C-4070"],"award-info":[{"award-number":["N66001- 15-C-4070"]}]},{"name":"EPSRC","award":["EP\/M016803"],"award-info":[{"award-number":["EP\/M016803"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2976749.2978357","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T12:46:35Z","timestamp":1477399595000},"page":"830-842","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":312,"title":["MASCOT"],"prefix":"10.1145","author":[{"given":"Marcel","family":"Keller","sequence":"first","affiliation":[{"name":"University of Bristol, Bristol, United Kingdom"}]},{"given":"Emmanuela","family":"Orsini","sequence":"additional","affiliation":[{"name":"University of Bristol, Bristol, United Kingdom"}]},{"given":"Peter","family":"Scholl","sequence":"additional","affiliation":[{"name":"University of Bristol, Bristol, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"http:\/\/sharemind.cs.ut.ee","author":"The Sharemind","year":"2007"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516738"},{"key":"e_1_3_2_1_3_1","volume-title":"Better preprocessing for secure multiparty computation. IACR Cryptology ePrint Archive","author":"Baum C.","year":"2016"},{"key":"e_1_3_2_1_4_1","volume-title":"Efficient multiparty protocols using circuit randomization. Advances in Cryptology - CRYPTO 1991","author":"Beaver D.","year":"1992"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/237814.237996"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20465-4_11"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-010-9071-0"},{"key":"e_1_3_2_1_8_1","first-page":"227","volume-title":"FC 2015, Revised Selected Papers","author":"Bogdanov D.","year":"2015"},{"key":"e_1_3_2_1_9_1","volume-title":"Students and taxes: a privacy-preserving social study using secure computation. IACR Cryptology ePrint Archive","author":"Bogdanov D.","year":"2015"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/874063.875553"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22174-8_3"},{"key":"e_1_3_2_1_13_1","volume-title":"Financial Cryptography","author":"Damg\u00e5rd I.","year":"2016"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32928-9_14"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40203-6_1"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1881412.1881451"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_38"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23113"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48797-6_29"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/646764.703977"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28420"},{"key":"e_1_3_2_1_22_1","volume-title":"Intel intrinsics guide. https:\/\/software.intel.com\/sites\/landingpage\/IntrinsicsGuide","author":"Intel","year":"2016"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_9"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00457-5_18"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-014-0271-8"},{"key":"e_1_3_2_1_26_1","first-page":"724","article-title":"Actively secure OT extension with optimal overhead. In Advances in Cryptology - CRYPTO 2015","author":"Keller M.","year":"2015","journal-title":"Part"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516744"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/2362793.2362807"},{"key":"e_1_3_2_1_30_1","first-page":"495","article-title":"Dishonest majority multi-party computation for binary circuits. In Advances in Cryptology - CRYPTO 2014","author":"Larraia E.","year":"2014","journal-title":"Part"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813666"},{"key":"e_1_3_2_1_32_1","first-page":"10A","article-title":"Generating strong one-way functions with cryptographic algorithm","volume":"27","author":"Matyas S. M.","year":"1985","journal-title":"IBM Technical Disclosure Bulletin"},{"key":"e_1_3_2_1_33_1","volume-title":"What is sse !@# good for? transposing a bit matrix. https:\/\/mischasan.wordpress.com\/2011\/07\/24\/what-is-sse-good-for-transposing-a-bit-matrix","year":"2011"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_40"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00457-5_22"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85174-5_31"},{"key":"e_1_3_2_1_37_1","first-page":"515","volume-title":"24th USENIX Security Symposium, USENIX Security 15","author":"Pinkas B.","year":"2015"},{"key":"e_1_3_2_1_38_1","first-page":"797","volume-title":"Proceedings of the 23rd USENIX Security Symposium","author":"Pinkas B.","year":"2014"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/1530441"},{"key":"e_1_3_2_1_40_1","volume-title":"Multiple precision integers and rationals. https:\/\/www.mpir.org","author":"The","year":"2016"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.25"}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","location":"Vienna Austria","acronym":"CCS'16","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978357","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978357","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:40:14Z","timestamp":1750218014000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978357"}},"subtitle":["Faster Malicious Arithmetic Secure Computation with Oblivious Transfer"],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":39,"alternative-id":["10.1145\/2976749.2978357","10.1145\/2976749"],"URL":"https:\/\/doi.org\/10.1145\/2976749.2978357","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}