Marcel Keller

Orcid: 0000-0003-2261-9376

Affiliations:
  • CSIRO, Australia


According to our database1, Marcel Keller authored at least 34 papers between 2009 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Rep3 Reloaded: On the Cost of Function-Dependent Preprocessing in Semi-Honest 3PC with Honest Majority.
IACR Cryptol. ePrint Arch., 2025

How To Scale Multi-Party Computation.
Proceedings of the 2025 Australasian Computer Science Week, 2025

2023
Data augmentation in natural language processing: a novel text generation approach for long and short text classifiers.
Int. J. Mach. Learn. Cybern., January, 2023

A Note on "Secure Quantized Training for Deep Learning".
IACR Cryptol. ePrint Arch., 2023

2022
Secure Quantized Training for Deep Learning.
Proceedings of the International Conference on Machine Learning, 2022

2021
PUBA: Privacy-Preserving User-Data Bookkeeping and Analytics.
IACR Cryptol. ePrint Arch., 2021

Fantastic Four: Honest-Majority Four-Party Secure Computation With Malicious Security.
Proceedings of the 30th USENIX Security Symposium, 2021

2020
Secure Evaluation of Quantized Neural Networks.
Proc. Priv. Enhancing Technol., 2020

Effectiveness of MPC-friendly Softmax Replacement.
CoRR, 2020

Use Your Brain! Arithmetic 3PC for Any Modulus with Active Security.
Proceedings of the 1st Conference on Information-Theoretic Cryptography, 2020

Securing DNSSEC Keys via Threshold ECDSA from Generic MPC.
Proceedings of the Computer Security - ESORICS 2020, 2020

Improved Primitives for MPC over Mixed Arithmetic-Binary Circuits.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

MP-SPDZ: A Versatile Framework for Multi-Party Computation.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
A Note on Our Submission to Track 4 of iDASH 2019.
IACR Cryptol. ePrint Arch., 2019

Secure Evaluation of Quantized Neural Networks.
IACR Cryptol. ePrint Arch., 2019

New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

2018
Reducing Communication Channels in MPC.
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018

Efficient Maliciously Secure Multiparty Computation for RAM.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

Overdrive: Making SPDZ Great Again.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

How to Choose Suitable Secure Multiparty Computation Using Generalized SPDZ.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Generalizing the SPDZ Compiler For Other Protocols.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
The Oblivious Machine - Or: How to Put the C into MPC.
Proceedings of the Progress in Cryptology - LATINCRYPT 2017, 2017

Faster Secure Multi-party Computation of AES and DES Using Lookup Tables.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
MASCOT: Faster Malicious Arithmetic Secure Computation with Oblivious Transfer.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
On the Amortized Complexity of Zero-knowledge Protocols.
IACR Cryptol. ePrint Arch., 2015

Actively Secure OT Extension with Optimal Overhead.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

A Unified Approach to MPC with Preprocessing Using OT.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
Efficient, Oblivious Data Structures for MPC.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Practical Covertly Secure MPC for Dishonest Majority - Or: Breaking the SPDZ Limits.
Proceedings of the Computer Security - ESORICS 2013, 2013

An architecture for practical actively secure MPC with dishonest majority.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012

Efficient Threshold Zero-Knowledge with Applications to User-Centric Protocols.
Proceedings of the Information Theoretic Security - 6th International Conference, 2012

2010
Secure Multiparty AES.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

2009
Secure Multiparty AES (full paper).
IACR Cryptol. ePrint Arch., 2009


  Loading...