YoVDO

Alternative Implementations of Secure Real Numbers

Offered By: Association for Computing Machinery (ACM) via YouTube

Tags

ACM CCS (Computer and Communications Security) Courses Cryptography Courses Performance Evaluation Courses Normalization Courses Data Security Courses

Course Description

Overview

Explore alternative implementations of secure real numbers in this conference talk presented at CCS 2016. Delve into secure computation outsourcing, golden section numbers, normalization, and logarithmic floats. Examine security claims and compare benchmarks for various mathematical operations including addition, multiplication, inverse, square root, exponent, and natural logarithm. Gain insights from the authors' conclusions on improving secure real number computations in cryptographic applications.

Syllabus

CYBERNETICA
Secure computation outsourcing
Background
The Problem Setting
Previous Work
Golden section numbers
Normalization
Logarithmic floats
Security claims
Benchmarks: Addition
Benchmarks: Multiplication
Benchmarks: Inverse
Benchmarks: Square root
Benchmarks: Exponent
Benchmarks: Natural logarithm
Conclusions


Taught by

ACM CCS

Related Courses

Peeling the Onion's User Experience Layer - Examining Naturalistic Use of the Tor Browser
Association for Computing Machinery (ACM) via YouTube
DeepCorr - Strong Flow Correlation Attacks on Tor Using Deep Learning
Association for Computing Machinery (ACM) via YouTube
SandScout - Automatic Detection of Flaws in iOS Sandbox Profiles
Association for Computing Machinery (ACM) via YouTube
Game of Decoys - Optimal Decoy Routing Through Game Theory
Association for Computing Machinery (ACM) via YouTube
PREDATOR - Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration
Association for Computing Machinery (ACM) via YouTube