M. Blake, J. McWaters, and R. Galaski. “The next generation of data-sharing in financial services: Using privacy enhancing techniques to unlock new value”. In: World Economic Forum. 2019, pp. 1–36. |
Y. Lindell. Secure Multiparty Computation (MPC). Cryptology ePrint Archive, Paper 2020/300. 2020. doi: 10.1145/3387108. |
Gartner. Gartner Says Digital Ethics is at the Peak of Inflated Expectations in the 2021 Gartner Hype Cycle for Privacy. 2021. (visited on 07/11/2023). |
H. Cho, D. J. Wu, and B. Berger. “Secure genome-wide association analysis using multiparty computation”. In: Nature biotechnology 36.6 (2018), pp. 547–551. doi: 10. 1038/nbt.4108. |
L. Csomor. Multi-Party Computation - Wo Sicherheit Türen öffnet. 2022. (visited on 06/04/2023). |
Panther Team. A Deep Dive Into Secure Multi-Party Computation (MPC). 2022. (visited on 06/04/2023). |
D. Evans, V. Kolesnikov, and M. Rosulek. A Pragmatic Introduction to Secure MultiParty Computation. Version: April 15, 2020. Now Publishers, Inc., 2018. |
C. Zhao, S. Zhao, M. Zhao, Z. Chen, C.-Z. Gao, H. Li, and Y.-a. Tan. “Secure multi-party computation: theory, practice and applications”. In: Information Sciences 476 (2019), pp. 357–372. doi: 10.1016/j.ins.2018.10.024. |
Nawazmalla. What is Secure Multiparty Computation? (visited on 06/04/2023). |
IEEE Digital Privacy. Applications of Multiparty Computation. (visited on 06/04/2023). |
M. Hastings, B. Hemenway, D. Noble, and S. Zdancewic. “Sok: General purpose compilers for secure multi-party computation”. In: 2019 IEEE symposium on security and privacy (SP). IEEE. 2019, pp. 1220–1237. doi: 10.1109/SP.2019.00028. |
Cambridge Dictionary. Auction. (visited on 06/04/2023). |
W. Kenton. Sealed-Bid Auction Definition, How It Works in Real Estate Sales. 2022. (visited on 06/04/2023). |
P. Bogetoft, D. L. Christensen, I. Damgård, M. Geisler, T. Jakobsen, M. Krøigaard, J. D. Nielsen, J. B. Nielsen, K. Nielsen, J. Pagter, M. Schwartzbach, and T. Toft. Multiparty Computation Goes Live. Cryptology ePrint Archive, Paper 2008/068. 2008. |
Gartner. Understanding Gartner’s Hype Cycles. 2018. (visited on 06/04/2023). |
B. Iannotta. U.S. Satellite Destroyed in Space Collision. 2009. (visited on 06/04/2023). |
Kelso, T.S. (2009). Analysis of the Iridium 33 Cosmos 2251 Collision. Proceedings of the 19th AIAA/AAS Astrodynamics Specialist Conference, 135. |
A. C. Yao. “Protocols for secure computations”. In: 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982). 1982, pp. 160–164. doi: 10.1109/SFCS.1982.38. |