
eBACS
 Referenced in 39 articles
[sw09828]
 Measurements of publickey Diffie–Hellman secretsharing systems, indexed by machine: eBATS (ECRYPT Benchmarking ... eBATS for publickey Diffie–Hellman secretsharing systems...

VIFF
 Referenced in 15 articles
[sw05804]
 multiplication, and comparison, all with Shamir secret shared outputs...

Sharemind
 Referenced in 13 articles
[sw22617]
 privacypreserving data processing that relies on share computing techniques. This is a standard ... choice of the secret sharing scheme and the design of the protocol suite. We have...

eBATS
 Referenced in 5 articles
[sw13007]
 encryption software, and publickeysecretsharing software. Submitted BATs (Benchmarkable Asymmetric Tools) are measured...

Wysteria
 Referenced in 4 articles
[sw41618]
 with builtin support for secret shares and with wire bundles, a new abstraction that...

PICCO
 Referenced in 3 articles
[sw38132]
 compiled programs is based on linear secret sharing, achieving efficiency and informationtheoretical security...

nielsen
 Referenced in 1 article
[sw24983]
 Analysis of secret sharing schemes based on Nielsen transformations. We investigate security properties ... secretsharing protocols proposed by Fine, Moldenhauer, and Rosenberger in Sections ... shares reduces the space of possible values of a secret to a set of polynomial...

MPSPDZ
 Referenced in 1 article
[sw41259]
 computation based on threeparty replicated secret sharing as well as Shamir’s secret sharing...

MPyC
 Referenced in 1 article
[sw41608]
 cryptographic protocols are based on threshold secret sharing over finite fields (using Shamir’s threshold ... scheme as well as pseudorandom secret sharing). The details of the secure computation protocols...

EDSL
 Referenced in 1 article
[sw22616]
 same programming language. The secret sharing execution platform provides informationtheoretic security against colluding servers...

PrivEdge
 Referenced in 1 article
[sw32540]
 clear would reveal private information, PrivEdge secretshares the parameters among two noncolluding MLaaS...

ProVerif
 Referenced in 42 articles
[sw06558]
 handle many different cryptographic primitives, including shared and publickey cryptography (encryption and signatures), hash ... properties: secrecy (the adversary cannot obtain the secret, CSFW’01), authentication (SAS’02) and more...

Geppetto
 Referenced in 10 articles
[sw31791]
 Multi QAPs, Geppetto reduces the cost of sharing state between computations (e.g, For MapReduce ... verifies the correct execution of proprietary (i.e, Secret) algorithms. Finally, Geppetto’s use of energy...

TransCrypt
 Referenced in 1 article
[sw37371]
 Minimal ARM Hypervisor. Attacks on memory, revealing secrets, for example, via DMA or cold boot ... correct system functionality, for example, for pages shared with peripheral devices. The detailed evaluation using ... that TransCrypt is able to effectively protect secrets in memory while keeping the performance impact...

startup
 Referenced in 0 articles
[sw17753]
 secret environment variables separate from other environment variables. It also makes it easier to share...

ARMS
 Referenced in 65 articles
[sw00048]
 ARMS: an algebraic recursive multilevel solver for general...

GAP
 Referenced in 3154 articles
[sw00320]
 GAP is a system for computational discrete algebra...

gmp
 Referenced in 282 articles
[sw00363]
 GMP is a free library for arbitrary precision...

Magma
 Referenced in 3296 articles
[sw00540]
 Computer algebra system (CAS). Magma is a large...

Mathematica
 Referenced in 6337 articles
[sw00554]
 Almost any workflow involves computing results, and that...