First Page | Document Content | |
---|---|---|
Date: 2016-01-22 16:19:24Secure multi-party computation Software Guard Extensions Cryptography Singapore Exchange Secure two-party computation Eval Communications protocol Cryptographic protocol | Using Intel Software Guard Extensions for Efficient Two-Party Secure Function Evaluation Debayan Gupta1 , Benjamin Mood2 , Joan Feigenbaum1 , Kevin Butler2 , and Patrick Traynor2 1Add to Reading ListSource URL: work.debayangupta.comDownload Document from Source WebsiteFile Size: 390,27 KBShare Document on Facebook |
Authenticated Garbling and Efficient Maliciously Secure Two-Party ComputationDocID: 1xUAz - View Document | |
Round-Optimal Secure Two-Party Computation from Trapdoor Permutations Michele Ciampi DIEM Università di Salerno ITALYDocID: 1vhtk - View Document | |
LEGO for Two Party Secure Computation Jesper Buus Nielsen and Claudio Orlandi BRICS, Department of Computer Science, Aarhus Universitet, ˚ Abogade 34, 8200 ˚ Arhus, DenmarkDocID: 1tquI - View Document | |
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries∗ Yehuda Lindell† Benny Pinkas‡DocID: 1tjRM - View Document | |
Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer∗ Yehuda Lindell† Benny Pinkas‡DocID: 1tjPL - View Document |