{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T17:40:25Z","timestamp":1770918025833,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,17]],"date-time":"2021-06-17T00:00:00Z","timestamp":1623888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,17]]},"DOI":"10.1145\/3437880.3460394","type":"proceedings-article","created":{"date-parts":[[2021,6,21]],"date-time":"2021-06-21T13:11:52Z","timestamp":1624281112000},"page":"63-74","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["<scp>Banners:<\/scp>\n            Binarized Neural Networks with Replicated Secret Sharing"],"prefix":"10.1145","author":[{"given":"Alberto","family":"Ibarrondo","sequence":"first","affiliation":[{"name":"IDEMIA &amp; EURECOM, Sophia Antipolis, France"}]},{"given":"Herv\u00e9","family":"Chabanne","sequence":"additional","affiliation":[{"name":"IDEMIA &amp; Telecom Paris, Paris, France"}]},{"given":"Melek","family":"\u00d6nen","sequence":"additional","affiliation":[{"name":"EURECOM, Sophia Antipolis, France"}]}],"member":"320","published-online":{"date-parts":[[2021,6,21]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"12th USENIX symposium on operating systems design and implementation (OSDI 16)","author":"Abadi Mart'in","year":"2016","unstructured":"Mart'in Abadi , Paul Barham , Jianmin Chen , Zhifeng Chen , Andy Davis , Jeffrey Dean , Matthieu Devin , Sanjay Ghemawat , Geoffrey Irving , Michael Isard , 2016 a. Tensorflow: A system for large-scale machine learning . In 12th USENIX symposium on operating systems design and implementation (OSDI 16) . 265--283. Mart'in Abadi, Paul Barham, Jianmin Chen, Zhifeng Chen, Andy Davis, Jeffrey Dean, Matthieu Devin, Sanjay Ghemawat, Geoffrey Irving, Michael Isard, et al. 2016a. Tensorflow: A system for large-scale machine learning. In 12th USENIX symposium on operating systems design and implementation (OSDI 16). 265--283."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_2_2_3_1","volume-title":"SOTERIA: In Search of Efficient Neural Networks for Private Inference. arXiv preprint arXiv:2007.12934","author":"Aggarwal Anshul","year":"2020","unstructured":"Anshul Aggarwal , Trevor E Carlson , Reza Shokri , and Shruti Tople . 2020 . SOTERIA: In Search of Efficient Neural Networks for Private Inference. arXiv preprint arXiv:2007.12934 (2020). Anshul Aggarwal, Trevor E Carlson, Reza Shokri, and Shruti Tople. 2020. SOTERIA: In Search of Efficient Neural Networks for Private Inference. arXiv preprint arXiv:2007.12934 (2020)."},{"key":"e_1_3_2_2_4_1","volume-title":"International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=rJfUCoR5KX","author":"Alizadeh Milad","year":"2019","unstructured":"Milad Alizadeh , Javier Fern\u00e1ndez-Marqu\u00e9s , Nicholas D. Lane , and Yarin Gal . 2019 . A Systematic Study of Binary Neural Networks' Optimisation . In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=rJfUCoR5KX Milad Alizadeh, Javier Fern\u00e1ndez-Marqu\u00e9s, Nicholas D. Lane, and Yarin Gal. 2019. A Systematic Study of Binary Neural Networks' Optimisation. In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=rJfUCoR5KX"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978331"},{"key":"e_1_3_2_2_6_1","volume-title":"Back to Simplicity: How to Train Accurate BNNs from Scratch?arxiv","author":"Bethge Joseph","year":"1906","unstructured":"Joseph Bethge , Haojin Yang , Marvin Bornstein , and Christoph Meinel . 2019. Back to Simplicity: How to Train Accurate BNNs from Scratch?arxiv : 1906 .08637 [cs.LG] Joseph Bethge, Haojin Yang, Marvin Bornstein, and Christoph Meinel. 2019. Back to Simplicity: How to Train Accurate BNNs from Scratch?arxiv: 1906.08637 [cs.LG]"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19571-6_16"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96878-0_17"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_12"},{"key":"e_1_3_2_2_10_1","unstructured":"Tom B Brown Benjamin Mann Nick Ryder Melanie Subbiah Jared Kaplan Prafulla Dhariwal Arvind Neelakantan Pranav Shyam Girish Sastry Amanda Askell etal 2020. Language models are few-shot learners. arXiv preprint arXiv:2005.14165 (2020).  Tom B Brown Benjamin Mann Nick Ryder Melanie Subbiah Jared Kaplan Prafulla Dhariwal Arvind Neelakantan Pranav Shyam Girish Sastry Amanda Askell et al. 2020. Language models are few-shot learners. arXiv preprint arXiv:2005.14165 (2020)."},{"key":"e_1_3_2_2_11_1","volume-title":"Improved binary neural networks. arXiv preprint arXiv:1909.13863","author":"Bulat Adrian","year":"2019","unstructured":"Adrian Bulat and Georgios Tzimiropoulos . 2019. XNOR-Net+ : Improved binary neural networks. arXiv preprint arXiv:1909.13863 ( 2019 ). Adrian Bulat and Georgios Tzimiropoulos. 2019. XNOR-Net+: Improved binary neural networks. arXiv preprint arXiv:1909.13863 (2019)."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s001459910006"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2001.959888"},{"key":"e_1_3_2_2_14_1","first-page":"35","article-title":"Privacy-Preserving Classification on Deep Neural Network","volume":"2017","author":"Chabanne Herv\u00e9","year":"2017","unstructured":"Herv\u00e9 Chabanne , Amaury de Wargny , Jonathan Milgram , Constance Morel , and Emmanuel Prouff . 2017 . Privacy-Preserving Classification on Deep Neural Network . IACR Cryptol. ePrint Arch. , Vol. 2017 (2017), 35 . Herv\u00e9 Chabanne, Amaury de Wargny, Jonathan Milgram, Constance Morel, and Emmanuel Prouff. 2017. Privacy-Preserving Classification on Deep Neural Network. IACR Cryptol. ePrint Arch., Vol. 2017 (2017), 35.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_2_15_1","volume-title":"CONCRETE: Concrete Operates oN Ciphertexts Rapidly by Extending TfhE.","author":"Chillotti Ilaria","year":"2020","unstructured":"Ilaria Chillotti , Marc Joye , Damien Ligier , Jean-Baptiste Orfila , and Samuel Tap . 2020 . CONCRETE: Concrete Operates oN Ciphertexts Rapidly by Extending TfhE. Ilaria Chillotti, Marc Joye, Damien Ligier, Jean-Baptiste Orfila, and Samuel Tap. 2020. CONCRETE: Concrete Operates oN Ciphertexts Rapidly by Extending TfhE."},{"key":"e_1_3_2_2_16_1","unstructured":"Ran Cohen. [n.d.]. Secure Multiparty Computation: Introduction. Open web. https:\/\/www.cs.tau.ac.il\/ iftachh\/Courses\/Seminars\/MPC\/Intro.pdf.  Ran Cohen. [n.d.]. Secure Multiparty Computation: Introduction. Open web. https:\/\/www.cs.tau.ac.il\/ iftachh\/Courses\/Seminars\/MPC\/Intro.pdf."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0077"},{"key":"e_1_3_2_2_19_1","unstructured":"Justin Johnson Fei-Fei Li Andrej Karpathy. 2016. CNNs in Practice. Open Web slides from lecture. http:\/\/cs231n.stanford.edu\/slides\/2016\/winter1516_lecture11.pdf.  Justin Johnson Fei-Fei Li Andrej Karpathy. 2016. CNNs in Practice. Open Web slides from lecture. http:\/\/cs231n.stanford.edu\/slides\/2016\/winter1516_lecture11.pdf."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56614-6_8"},{"key":"e_1_3_2_2_22_1","volume-title":"Gartner Predictions on Biometric Authentication. https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2019-02-05-gartner-predicts-increased-adoption-of-mobile-centric","year":"2019","unstructured":"Gartner. 2019. Gartner Predictions on Biometric Authentication. https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2019-02-05-gartner-predicts-increased-adoption-of-mobile-centric ( 2019 ). Gartner. 2019. Gartner Predictions on Biometric Authentication. https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2019-02-05-gartner-predicts-increased-adoption-of-mobile-centric (2019)."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.21105\/joss.01746"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_2_25_1","volume-title":"International Conference on Machine Learning. 201--210","author":"Gilad-Bachrach Ran","year":"2016","unstructured":"Ran Gilad-Bachrach , Nathan Dowlin , Kim Laine , Kristin Lauter , Michael Naehrig , and John Wernsing . 2016 . Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy . In International Conference on Machine Learning. 201--210 . Ran Gilad-Bachrach, Nathan Dowlin, Kim Laine, Kristin Lauter, Michael Naehrig, and John Wernsing. 2016. Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy. In International Conference on Machine Learning. 201--210."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"crossref","unstructured":"Oded Goldreich Silvio Micali and Avi Wigderson. 2019. How to play any mental game or a completeness theorem for protocols with honest majority. In Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali. 307--328.  Oded Goldreich Silvio Micali and Avi Wigderson. 2019. How to play any mental game or a completeness theorem for protocols with honest majority. In Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali. 307--328.","DOI":"10.1145\/3335741.3335755"},{"key":"e_1_3_2_2_27_1","volume-title":"Advances in Neural Information Processing Systems 32, H. Wallach, H. Larochelle, A. Beygelzimer, F. dtextquotesingle Alch\u00e9-Buc","author":"Helwegen Koen","unstructured":"Koen Helwegen , James Widdicombe , Lukas Geiger , Zechun Liu , Kwang-Ting Cheng , and Roeland Nusselder . 2019. Latent Weights Do Not Exist: Rethinking Binarized Neural Network Optimization . In Advances in Neural Information Processing Systems 32, H. Wallach, H. Larochelle, A. Beygelzimer, F. dtextquotesingle Alch\u00e9-Buc , E. Fox, and R. Garnett (Eds.). Curran Associates, Inc. , 7533--7544. http:\/\/papers.nips.cc\/paper\/8971-latent-weights-do-not-exist-rethinking-binarized-neural-network-optimization.pdf Koen Helwegen, James Widdicombe, Lukas Geiger, Zechun Liu, Kwang-Ting Cheng, and Roeland Nusselder. 2019. Latent Weights Do Not Exist: Rethinking Binarized Neural Network Optimization. In Advances in Neural Information Processing Systems 32, H. Wallach, H. Larochelle, A. Beygelzimer, F. dtextquotesingle Alch\u00e9-Buc, E. Fox, and R. Garnett (Eds.). Curran Associates, Inc., 7533--7544. http:\/\/papers.nips.cc\/paper\/8971-latent-weights-do-not-exist-rethinking-binarized-neural-network-optimization.pdf"},{"key":"e_1_3_2_2_28_1","volume-title":"Cryptodl: Deep neural networks over encrypted data. arXiv preprint arXiv:1711.05189","author":"Hesamifard Ehsan","year":"2017","unstructured":"Ehsan Hesamifard , Hassan Takabi , and Mehdi Ghasemi . 2017 . Cryptodl: Deep neural networks over encrypted data. arXiv preprint arXiv:1711.05189 (2017). Ehsan Hesamifard, Hassan Takabi, and Mehdi Ghasemi. 2017. Cryptodl: Deep neural networks over encrypted data. arXiv preprint arXiv:1711.05189 (2017)."},{"key":"e_1_3_2_2_29_1","unstructured":"Itay Hubara Matthieu Courbariaux Daniel Soudry Ran El-Yaniv and Yoshua Bengio. 2016. Binarized neural networks. In Advances in neural information processing systems. 4107--4115.  Itay Hubara Matthieu Courbariaux Daniel Soudry Ran El-Yaniv and Yoshua Bengio. 2016. Binarized neural networks. In Advances in neural information processing systems. 4107--4115."},{"key":"e_1_3_2_2_30_1","volume-title":"Data Privacy Management, Cryptocurrencies and Blockchain Technology","author":"Ibarrondo Alberto","unstructured":"Alberto Ibarrondo and Melek \u00d6nen . 2018. FHE-compatible batch normalization for privacy preserving deep learning . In Data Privacy Management, Cryptocurrencies and Blockchain Technology . Springer , 389--404. Alberto Ibarrondo and Melek \u00d6nen. 2018. FHE-compatible batch normalization for privacy preserving deep learning. In Data Privacy Management, Cryptocurrencies and Blockchain Technology. Springer, 389--404."},{"key":"e_1_3_2_2_31_1","volume-title":"Top 4 trends in Biometrics for","author":"IDEMIA.","year":"2020","unstructured":"IDEMIA. [n.d.]. Top 4 trends in Biometrics for 2020 . https:\/\/www.idemia.com\/news\/idemias-top-4-trends-biometrics-2020--2020-01--28 ( [n.,d.]). IDEMIA. [n.d.]. Top 4 trends in Biometrics for 2020. https:\/\/www.idemia.com\/news\/idemias-top-4-trends-biometrics-2020--2020-01--28 ( [n.,d.])."},{"key":"e_1_3_2_2_32_1","volume-title":"International Conference on Machine Learning. 448--456","author":"Ioffe Sergey","year":"2015","unstructured":"Sergey Ioffe and Christian Szegedy . 2015 . Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift . In International Conference on Machine Learning. 448--456 . Sergey Ioffe and Christian Szegedy. 2015. Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift. In International Conference on Machine Learning. 448--456."},{"key":"e_1_3_2_2_33_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Juvekar Chiraag","year":"2018","unstructured":"Chiraag Juvekar , Vinod Vaikuntanathan , and Anantha Chandrakasan . 2018 . GAZELLE: A low latency framework for secure neural network inference . In 27th USENIX Security Symposium (USENIX Security 18) . 1651--1669. Chiraag Juvekar, Vinod Vaikuntanathan, and Anantha Chandrakasan. 2018. GAZELLE: A low latency framework for secure neural network inference. In 27th USENIX Security Symposium (USENIX Security 18). 1651--1669."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00092"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1137\/090755886"},{"key":"e_1_3_2_2_37_1","volume-title":"GWAS in cancer: progress and challenges. Molecular Genetics and Genomics","author":"Liang Baiqiang","year":"2020","unstructured":"Baiqiang Liang , Hongrong Ding , Lianfang Huang , Haiqing Luo , and Xiao Zhu . 2020. GWAS in cancer: progress and challenges. Molecular Genetics and Genomics ( 2020 ), 1--25. Baiqiang Liang, Hongrong Ding, Lianfang Huang, Haiqing Luo, and Xiao Zhu. 2020. GWAS in cancer: progress and challenges. Molecular Genetics and Genomics (2020), 1--25."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134056"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243760"},{"key":"e_1_3_2_2_40_1","volume-title":"URL https:\/\/openai. com\/blog\/musenet","author":"Payne Christine","year":"2019","unstructured":"Christine Payne . 2019. MuseNet, 2019. URL https:\/\/openai. com\/blog\/musenet ( 2019 ). Christine Payne. 2019. MuseNet, 2019. URL https:\/\/openai. com\/blog\/musenet (2019)."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46493-0_32"},{"key":"e_1_3_2_2_42_1","volume-title":"Yolov3: An incremental improvement. arXiv preprint arXiv:1804.02767","author":"Redmon Joseph","year":"2018","unstructured":"Joseph Redmon and Ali Farhadi . 2018. Yolov3: An incremental improvement. arXiv preprint arXiv:1804.02767 ( 2018 ). Joseph Redmon and Ali Farhadi. 2018. Yolov3: An incremental improvement. arXiv preprint arXiv:1804.02767 (2018)."},{"key":"e_1_3_2_2_43_1","volume-title":"Proceedings of the 28th USENIX Conference on Security Symposium. USENIX Association, USA, 1501--1518","author":"Riazi M. Sadegh","year":"2019","unstructured":"M. Sadegh Riazi , Mohammad Samragh , Hao Chen , Kim Laine , Kristin Lauter , and Farinaz Koushanfar . 2019 . XONN: XNOR-Based Oblivious Deep Neural Network Inference . In Proceedings of the 28th USENIX Conference on Security Symposium. USENIX Association, USA, 1501--1518 . M. Sadegh Riazi, Mohammad Samragh, Hao Chen, Kim Laine, Kristin Lauter, and Farinaz Koushanfar. 2019. XONN: XNOR-Based Oblivious Deep Neural Network Inference. In Proceedings of the 28th USENIX Conference on Security Symposium. USENIX Association, USA, 1501--1518."},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196522"},{"key":"e_1_3_2_2_45_1","volume-title":"Antoine Chassang, Carlo Gatta, and Yoshua Bengio.","author":"Romero Adriana","year":"2014","unstructured":"Adriana Romero , Nicolas Ballas , Samira Ebrahimi Kahou , Antoine Chassang, Carlo Gatta, and Yoshua Bengio. 2014 . Fitnets : Hints for thin deep nets. arXiv preprint arXiv:1412.6550 (2014). Adriana Romero, Nicolas Ballas, Samira Ebrahimi Kahou, Antoine Chassang, Carlo Gatta, and Yoshua Bengio. 2014. Fitnets: Hints for thin deep nets. arXiv preprint arXiv:1412.6550 (2014)."},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_2_47_1","volume-title":"Electronics","volume":"8","author":"Simons Taylor","year":"2019","unstructured":"Taylor Simons and Dah-Jye Lee . 2019 . A Review of Binarized Neural Networks . Electronics , Vol. 8 , 6 (2019). https:\/\/doi.org\/10.3390\/electronics8060661 10.3390\/electronics8060661 Taylor Simons and Dah-Jye Lee. 2019. A Review of Binarized Neural Networks. Electronics, Vol. 8, 6 (2019). https:\/\/doi.org\/10.3390\/electronics8060661"},{"key":"e_1_3_2_2_48_1","volume-title":"Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556","author":"Simonyan Karen","year":"2014","unstructured":"Karen Simonyan and Andrew Zisserman . 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 ( 2014 ). Karen Simonyan and Andrew Zisserman. 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)."},{"key":"e_1_3_2_2_49_1","volume-title":"EfficientNet: Rethinking Model Scaling for Convolutional Neural Networks. In International Conference on Machine Learning. 6105--6114","author":"Tan Mingxing","year":"2019","unstructured":"Mingxing Tan and Quoc Le . 2019 . EfficientNet: Rethinking Model Scaling for Convolutional Neural Networks. In International Conference on Machine Learning. 6105--6114 . Mingxing Tan and Quoc Le. 2019. EfficientNet: Rethinking Model Scaling for Convolutional Neural Networks. In International Conference on Machine Learning. 6105--6114."},{"key":"e_1_3_2_2_50_1","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Tram\u00e8r Florian","year":"2016","unstructured":"Florian Tram\u00e8r , Fan Zhang , Ari Juels , Michael K Reiter , and Thomas Ristenpart . 2016 . Stealing machine learning models via prediction apis . In 25th USENIX Security Symposium (USENIX Security 16) . 601--618. Florian Tram\u00e8r, Fan Zhang, Ari Juels, Michael K Reiter, and Thomas Ristenpart. 2016. Stealing machine learning models via prediction apis. In 25th USENIX Security Symposium (USENIX Security 16). 601--618."},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2017.12.005"},{"key":"e_1_3_2_2_52_1","first-page":"442","article-title":"SecureNN: Efficient and Private Neural Network Training","volume":"2018","author":"Wagh Sameer","year":"2018","unstructured":"Sameer Wagh , Divya Gupta , and Nishanth Chandran . 2018 . SecureNN: Efficient and Private Neural Network Training . IACR Cryptol. ePrint Arch. , Vol. 2018 (2018), 442 . Sameer Wagh, Divya Gupta, and Nishanth Chandran. 2018. SecureNN: Efficient and Private Neural Network Training. IACR Cryptol. ePrint Arch., Vol. 2018 (2018), 442.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_2_53_1","volume-title":"FALCON: Honest-Majority Maliciously Secure Framework for Private Deep Learning. arXiv preprint arXiv:2004.02229","author":"Wagh Sameer","year":"2020","unstructured":"Sameer Wagh , Shruti Tople , Fabrice Benhamouda , Eyal Kushilevitz , Prateek Mittal , and Tal Rabin . 2020 . FALCON: Honest-Majority Maliciously Secure Framework for Private Deep Learning. arXiv preprint arXiv:2004.02229 (2020). Sameer Wagh, Shruti Tople, Fabrice Benhamouda, Eyal Kushilevitz, Prateek Mittal, and Tal Rabin. 2020. FALCON: Honest-Majority Maliciously Secure Framework for Private Deep Learning. arXiv preprint arXiv:2004.02229 (2020)."},{"key":"e_1_3_2_2_54_1","unstructured":"Wikipedia. 2020. Ripple Carry Adder. Open web. https:\/\/en.wikipedia.org\/wiki\/Adder_(electronics)#Ripple-carry_adder.  Wikipedia. 2020. Ripple Carry Adder. Open web. https:\/\/en.wikipedia.org\/wiki\/Adder_(electronics)#Ripple-carry_adder."},{"key":"e_1_3_2_2_55_1","volume-title":"27th Annual Symposium on Foundations of Computer Science (sfcs","author":"Chi-Chih Yao Andrew","year":"1986","unstructured":"Andrew Chi-Chih Yao . 1986 . How to generate and exchange secrets . In 27th Annual Symposium on Foundations of Computer Science (sfcs 1986). IEEE, 162--167. Andrew Chi-Chih Yao. 1986. How to generate and exchange secrets. In 27th Annual Symposium on Foundations of Computer Science (sfcs 1986). IEEE, 162--167."},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-71589-6_9"}],"event":{"name":"IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security","location":"Virtual Event Belgium","acronym":"IH&MMSec '21","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3437880.3460394","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3437880.3460394","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:26Z","timestamp":1750191446000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3437880.3460394"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,17]]},"references-count":54,"alternative-id":["10.1145\/3437880.3460394","10.1145\/3437880"],"URL":"https:\/\/doi.org\/10.1145\/3437880.3460394","relation":{},"subject":[],"published":{"date-parts":[[2021,6,17]]},"assertion":[{"value":"2021-06-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}