Explore alternative implementations of secure real numbers in this conference talk presented at CCS 2016. Delve into secure computation outsourcing, golden section numbers, normalization, and logarithmic floats. Examine security claims and compare benchmarks for various mathematical operations including addition, multiplication, inverse, square root, exponent, and natural logarithm. Gain insights from the authors' conclusions on improving secure real number computations in cryptographic applications.
Alternative Implementations of Secure Real Numbers