Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Alternative Implementations of Secure Real Numbers

Association for Computing Machinery (ACM) via YouTube

Overview

Explore alternative implementations of secure real numbers in this conference talk presented at CCS 2016. Delve into secure computation outsourcing, golden section numbers, normalization, and logarithmic floats. Examine security claims and compare benchmarks for various mathematical operations including addition, multiplication, inverse, square root, exponent, and natural logarithm. Gain insights from the authors' conclusions on improving secure real number computations in cryptographic applications.

Syllabus

CYBERNETICA
Secure computation outsourcing
Background
The Problem Setting
Previous Work
Golden section numbers
Normalization
Logarithmic floats
Security claims
Benchmarks: Addition
Benchmarks: Multiplication
Benchmarks: Inverse
Benchmarks: Square root
Benchmarks: Exponent
Benchmarks: Natural logarithm
Conclusions

Taught by

ACM CCS

Reviews

Start your review of Alternative Implementations of Secure Real Numbers

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.