Abstract is missing.
- Doing Real Work with FHE: The Case of Logistic RegressionJack L. H. Crawford, Craig Gentry, Shai Halevi, Daniel Platt, Victor Shoup. 1-12 [doi]
- High-Throughput Secure AES ComputationKoji Chida, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Benny Pinkas. 13-24 [doi]
- More Practical Privacy-Preserving Machine Learning as A Service via Efficient Secure Matrix MultiplicationWenjie Lu, Jun Sakuma. 25-36 [doi]
- Bit Decomposition Protocols in Secure Multiparty ComputationPeeter Laud, Alisa Pankova. 37-48 [doi]
- Marble: Making Fully Homomorphic Encryption Accessible to AllAlexander Viand, Hossein Shafagh. 49-60 [doi]
- Implementation and Evaluation of Improved Gaussian Sampling for Lattice TrapdoorsKamil Doruk Gür, Yuriy Polyakov, Kurt Rohloff, Gerard W. Ryan, Erkay Savas. 61-71 [doi]