Alternative Implementations of Secure Real Numbers
Offered By: Association for Computing Machinery (ACM) via YouTube
Course Description
Overview
Explore alternative implementations of secure real numbers in this conference talk presented at CCS 2016. Delve into secure computation outsourcing, golden section numbers, normalization, and logarithmic floats. Examine security claims and compare benchmarks for various mathematical operations including addition, multiplication, inverse, square root, exponent, and natural logarithm. Gain insights from the authors' conclusions on improving secure real number computations in cryptographic applications.
Syllabus
CYBERNETICA
Secure computation outsourcing
Background
The Problem Setting
Previous Work
Golden section numbers
Normalization
Logarithmic floats
Security claims
Benchmarks: Addition
Benchmarks: Multiplication
Benchmarks: Inverse
Benchmarks: Square root
Benchmarks: Exponent
Benchmarks: Natural logarithm
Conclusions
Taught by
ACM CCS
Related Courses
Observing and Analysing Performance in SportOpenLearning Introduction aux réseaux mobiles
Institut Mines-Télécom via France Université Numerique Claves para Gestionar Personas
IESE Business School via Coursera الأجهزة الطبية في غرف العمليات والعناية المركزة
Rwaq (رواق) Clinical Supervision with Confidence
University of East Anglia via FutureLearn