<--- Back to Details
First PageDocument Content
Cryptographic protocols / Mathematics / Secure multi-party computation / Linear algebra / Valuation / Linear combination / Finite field
Date: 2015-06-09 02:13:24
Cryptographic protocols
Mathematics
Secure multi-party computation
Linear algebra
Valuation
Linear combination
Finite field

Efficient Multi-Party Computation: from Passive to Active Security via Secure SIMD Circuits Daniel Genkin12 , Yuval Ishai1 , and Antigoni Polychroniadou3 1

Add to Reading List

Source URL: web.eecs.umich.edu

Download Document from Source Website

File Size: 493,49 KB

Share Document on Facebook

Similar Documents

Polynomial Time Interactive Proofs for Linear Algebra with Exponential Matrix Dimensions and Scalars Given by Polynomial Time Circuits In memory of Wen-tsun Wu–Jean-Guillaume Dumas

Polynomial Time Interactive Proofs for Linear Algebra with Exponential Matrix Dimensions and Scalars Given by Polynomial Time Circuits In memory of Wen-tsun Wu–Jean-Guillaume Dumas

DocID: 1xUE0 - View Document

1  Roadmap for the Development of a Linear Algebra Library for Exascale Computing SLATE: Software for Linear Algebra Targeting Exascale

1 Roadmap for the Development of a Linear Algebra Library for Exascale Computing SLATE: Software for Linear Algebra Targeting Exascale

DocID: 1xUyc - View Document

Recent Progress in Linear Algebra and Lattice Basis Reduction Gilles Villard CNRS, ENS de Lyon, INRIA, UCBL, Université de Lyon Laboratoire LIP

Recent Progress in Linear Algebra and Lattice Basis Reduction Gilles Villard CNRS, ENS de Lyon, INRIA, UCBL, Université de Lyon Laboratoire LIP

DocID: 1xUmT - View Document

3  Designing SLATE SLATE: Software for Linear Algebra Targeting Exascale Jakub Kurzak Panruo Wu

3 Designing SLATE SLATE: Software for Linear Algebra Targeting Exascale Jakub Kurzak Panruo Wu

DocID: 1xT5s - View Document

9. Linear Algebra Po-Shen Loh CMU Putnam Seminar, Fall

9. Linear Algebra Po-Shen Loh CMU Putnam Seminar, Fall

DocID: 1vrLR - View Document