Cryptology ePrint Archive: Report 2013/046

Available versions in chronological order


Fast and Maliciously Secure Two-Party Computation Using the GPU
Tore Kasper Frederiksen and Jesper Buus Nielsen

Fast and Maliciously Secure Two-Party Computation Using the GPU
Tore Kasper Frederiksen and Jesper Buus Nielsen

Fast and Maliciously Secure Two-Party Computation Using the GPU
Tore Kasper Frederiksen and Jesper Buus Nielsen

Fast and Maliciously Secure Two-Party Computation Using the GPU
Tore Kasper Frederiksen and Jesper Buus Nielsen

Fast and Maliciously Secure Two-Party Computation Using the GPU
Tore Kasper Frederiksen and Jesper Buus Nielsen

Fast and Maliciously Secure Two-Party Computation Using the GPU
Tore Kasper Frederiksen and Jesper Buus Nielsen
Original publication (with major differences): ACNS

Fast and Maliciously Secure Two-Party Computation Using the GPU
Tore Kasper Frederiksen and Jesper Buus Nielsen
Original publication (with major differences): ACNS

Fast and Maliciously Secure Two-Party Computation Using the GPU
Tore Kasper Frederiksen and Jesper Buus Nielsen
Original publication (with major differences): ACNS

Fast and Maliciously Secure Two-Party Computation Using the GPU
Tore Kasper Frederiksen and Jesper Buus Nielsen
Original publication (with major differences): ACNS


[ Cryptology ePrint archive ]