Back to Results
First PageMeta Content
Secure multi-party computation / Circuit complexity / Circuit / Lookup table / Boolean circuit / Advantage / Randomized algorithm / Blinding / Field-programmable gate array / Theoretical computer science / Applied mathematics / Computational complexity theory


Small, Stupid, and Scalable: Secure Computing with Faerieplay∗ Alexander Iliev Sean W. Smith
Add to Reading List

Document Date: 2010-11-08 12:53:14


Open Document

File Size: 487,23 KB

Share Result on Facebook

City

a TTP / Espoo / London / Chicago / /

Company

Dell / IBM / AES / Cambridge University Press / ACM Press / Springer-Verlag New York Inc. / CBC / Vertex / Intel / /

Country

United States / United Kingdom / Finland / /

Currency

USD / /

/

Event

Bankruptcy / /

Facility

BUILDING BLOCKS / Functional Graph Library / /

IndustryTerm

software configuration / blinded-circuit solution / secure protocols / polylog algorithm / capable parsing tool / randomized encryption algorithm / deterministic decryption algorithm / purpose computing environment / shortest path algorithm / Web model / electricity power scheduling auctions / much faster hardware / show solutions / permutation algorithm / self-reliant protocols / self-reliant circuit-based solutions / cryptographic acceleration hardware / follow-on product / cryptographic protocols / trusted computing model / rst protocol / randomized algorithm / obvious solution / recent work prototyping custom hardware / randomized key-generation algorithm / exponential algorithms / faster hardware / trusted computing / computing / long pre-processing operations / subsequent software / low-bandwidth devices / software application / efficient algorithms / square root algorithm / /

OperatingSystem

Linux / /

Organization

Cambridge University / Dartmouth College / Boris / /

Person

Andrew W. Appel / Leroy Schwarz / Sean W. Smith / Rakesh Agrawal / Silvio Micali / Boris / Alexandre Evfimievski / Mikhail Atallah / Ramakrishnan Srikant / Wenliang Du / Jiangtao Li / Agnes / Mihir Bellare / Bob / Dmitri Asonov / Alice / Markus Stadler / Joan Feigenbaum / Vinayak Deshpande / Peggy / Matt Blaze / Mikhail J. Atallah / Moni Naor / Marina Blanton / Keith Frikken / Christian Cachin / Word num / Johann-Christoph Freytag / Alexander Iliev Sean / Phillip Rogaway / /

Position

rst author / Idx edge_list_head / General / player / circuit evaluator / IND-CPA / prospective Faerieplay programmer / evaluator / Private Information Retrieval The problem / Private Information Retrieval / programmer / /

Product

RAM / Oblivious RAM / /

ProgrammingLanguage

Java / Pascal / C / Haskell / NIL / C++ / /

ProvinceOrState

Illinois / /

Technology

boolean circuit-based SMC protocol / FPGA / Virtual Machine / radiation / RAM / three algorithms / two-party protocol / self-reliant protocols / randomized key-generation algorithm / permutation algorithm / efficient algorithms / polylog algorithm / Linux / shortest path algorithm / API / randomized algorithms / self-reliant SMC protocols / PIR/W algorithm / smart card / private key / operating system / Two main algorithms / SMC protocols / SSL / Terms Algorithms / square root algorithm / Encryption / Cryptography / FLASH memory / highbandwidth encryption / Remotely Keyed Encryption / deterministic decryption algorithm / Java / randomized encryption algorithm / OT protocol / 486 processor / semantically-secure encryption / rst protocol / expensive algorithm / SCSI / gigabit Ethernet / /

URL

http /

SocialTag