<--- Back to Details
First PageDocument Content
Secure multi-party computation / Software Guard Extensions / Cryptography / Singapore Exchange / Secure two-party computation / Eval / Communications protocol / Cryptographic protocol
Date: 2016-01-22 16:19:24
Secure multi-party computation
Software Guard Extensions
Cryptography
Singapore Exchange
Secure two-party computation
Eval
Communications protocol
Cryptographic protocol

Using Intel Software Guard Extensions for Efficient Two-Party Secure Function Evaluation Debayan Gupta1 , Benjamin Mood2 , Joan Feigenbaum1 , Kevin Butler2 , and Patrick Traynor2 1

Add to Reading List

Source URL: work.debayangupta.com

Download Document from Source Website

File Size: 390,27 KB

Share Document on Facebook

Similar Documents

Communications Protocol Category: Number: Audience: Issued: Owner:

Communications Protocol Category: Number: Audience: Issued: Owner:

DocID: 1vcl7 - View Document

Amateur Radio Continuous Wave Communications Protocol (CW ~ Morse Code) History and Application Tutorial

Amateur Radio Continuous Wave Communications Protocol (CW ~ Morse Code) History and Application Tutorial

DocID: 1uYVU - View Document

Florida Department of Transportation (FDOT) Actuated Traffic Signal Controller (ASC) Management Information Base (MIB) and National Transportation Communications for ITS (Intelligent Transportation Systems) Protocol (NTC

DocID: 1ufnI - View Document

Commercial in Confidence EVK LoRes Serial Communications Protocol

DocID: 1u5IT - View Document

MindSet Communications Protocol June 28, 2010 e NeuroSky product families consist of hardware and software components for simple integration of this biosensor technology into consumer and industrial end-applications.

MindSet Communications Protocol June 28, 2010 e NeuroSky product families consist of hardware and software components for simple integration of this biosensor technology into consumer and industrial end-applications.

DocID: 1tL86 - View Document