Login / Signup
Faster Maliciously Secure Two-Party Computation Using the GPU.
Tore Kasper Frederiksen
Thomas P. Jakobsen
Jesper Buus Nielsen
Published in:
IACR Cryptol. ePrint Arch. (2014)
Keyphrases
</>
parallel computation
real time
highly efficient
data sets
database
parallel implementation
parallel computing
key management
memory efficient
standard model
graphics hardware
key agreement protocol