Login / Signup
Fast and Maliciously Secure Two-Party Computation Using the GPU.
Tore Kasper Frederiksen
Jesper Buus Nielsen
Published in:
ACNS (2013)
Keyphrases
</>
parallel computation
lightweight
real time
data sets
neural network
parallel processing
parallel implementation
information systems
information security
security mechanisms
gpu implementation
key agreement protocol