Articles citing this article

The Citing articles tool gives a list of articles citing the current article.
The citing articles come from EDP Sciences database, as well as other publishers participating in CrossRef Cited-by Linking Program. You can set up your personal account to receive an email alert each time this article is cited by a new article (see the menu on the right-hand side of the abstract page).

Cited article:

Post‐quantum secure two‐party computing protocols against malicious adversaries

Yachao Huo, Zongqu Zhao, Panke Qin, Shujing Wang and Chengfu Zheng
Concurrency and Computation: Practice and Experience 36 (4) (2024)
https://doi.org/10.1002/cpe.7923

Secure Multi-Party Computation for Machine Learning: A Survey

Ian Zhou, Farzad Tofigh, Massimo Piccardi, Mehran Abolhasan, Daniel Franklin and Justin Lipman
IEEE Access 12 53881 (2024)
https://doi.org/10.1109/ACCESS.2024.3388992

Multi-key homomorphic encryption with tightened RGSW ciphertexts without relinearization for ciphertexts product

Xiaoliang Che, Longfei Liu, Baocang Wang, Yiliang Han, Xu An Wang, Xiaoyuan Yang and Tanping Zhou
Journal of King Saud University - Computer and Information Sciences 35 (10) 101794 (2023)
https://doi.org/10.1016/j.jksuci.2023.101794

Privacy-preserving cryptographic algorithms and protocols: a survey on designs and applications

Wei HUO, Yu YU, Kang YANG, Zhongxiang ZHENG, Xiangxue LI, Li YAO and Jie XIE
SCIENTIA SINICA Informationis 53 (9) 1688 (2023)
https://doi.org/10.1360/SSI-2022-0434