Главная
Study mode:
on
1
CYBERNETICA
2
Secure computation outsourcing
3
Background
4
The Problem Setting
5
Previous Work
6
Golden section numbers
7
Normalization
8
Logarithmic floats
9
Security claims
10
Benchmarks: Addition
11
Benchmarks: Multiplication
12
Benchmarks: Inverse
13
Benchmarks: Square root
14
Benchmarks: Exponent
15
Benchmarks: Natural logarithm
16
Conclusions
Description:
Explore alternative implementations of secure real numbers in this conference talk presented at CCS 2016. Delve into secure computation outsourcing, golden section numbers, normalization, and logarithmic floats. Examine security claims and compare benchmarks for various mathematical operations including addition, multiplication, inverse, square root, exponent, and natural logarithm. Gain insights from the authors' conclusions on improving secure real number computations in cryptographic applications.

Alternative Implementations of Secure Real Numbers

Association for Computing Machinery (ACM)
Add to list
0:00 / 0:00