Privacy-preserving decision trees evaluation via linear functions RKH Tai, JPK Ma, Y Zhao, SSM Chow Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017 | 127 | 2017 |
Let’s stride blindfolded in a forest: Sublinear multi-client decision trees evaluation JPK Ma, RKH Tai, Y Zhao, SSM Chow | 25 | 2021 |
Real Threshold ECDSA. HWH Wong, JPK Ma, HHF Yin, SSM Chow NDSS, 2023 | 18 | 2023 |
Secure-computation-friendly private set intersection from oblivious compact graph evaluation JPK Ma, SSM Chow Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022 | 11 | 2022 |
On multi-channel Huffman codes for asymmetric-alphabet channels HHF Yin, X Wang, KH Ng, RWF Lai, LKL Ng, JPK Ma 2021 IEEE International Symposium on Information Theory (ISIT), 2024-2029, 2021 | 6 | 2021 |
Learning Model with Error-Exposing the Hidden Model of BAYHENN. HWH Wong, JPK Ma, DPH Wong, LKL Ng, SSM Chow IJCAI, 3529-3535, 2020 | 6 | 2020 |
Secure multiparty computation of threshold signatures made more efficient HWH Wong, JPK Ma, SSM Chow ISOC Network and Distributed System Security Symposium–NDSS 2024, 2024 | 5 | 2024 |
SMART credentials in the multi-queue of slackness (or Secure management of anonymous reputation traits without global halting) JPK Ma, SSM Chow 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P), 896-912, 2023 | 5 | 2023 |
How (Not) to build threshold EdDSA HWH Wong, JPK Ma, HHF Yin, SSM Chow Proceedings of the 26th International Symposium on Research in Attacks …, 2023 | 4 | 2023 |
Scored anonymous credentials SSM Chow, JPK Ma, TH Yuen International Conference on Applied Cryptography and Network Security, 484-515, 2023 | 4 | 2023 |