• Datalog

  • Referenced in 289 articles [sw20023]
  • information extraction, networking, program analysis, security, and cloud computing.[1] Its origins date back...
  • gmp

  • Referenced in 282 articles [sw00363]
  • cryptography applications and research, Internet security applications, algebra systems, computational algebra research...
  • Globus Toolkit

  • Referenced in 176 articles [sw09648]
  • Grid,” letting people share computing power, databases, and other tools securely online across corporate, institutional...
  • Amazon EC2

  • Referenced in 47 articles [sw29777]
  • service that provides secure, resizable compute capacity in the cloud. It is designed to make...
  • TASTY

  • Referenced in 19 articles [sw09865]
  • Tool for Automating Secure Two-partY computations. Secure two-party computation allows two untrusting parties ... Existing cryptographic compilers can automatically generate secure computation protocols from high-level specifications ... executing, benchmarking, and comparing, efficient secure two-party computation protocols. TASTY is a new compiler ... techniques and optimizations for practical secure two-party computation with low online latency. Moreover...
  • Möbius

  • Referenced in 25 articles [sw04098]
  • studying the reliability, availability, and performance of computer and network systems, its use has expanded ... effects of malicious attackers on secure computer systems, in addition to the original applications. That...
  • M-TREE

  • Referenced in 14 articles [sw02565]
  • Secure processor architectures enable new sets of applications such as commercial grid computing, software copy ... secure mobile agents by providing secure computing environments that are immune to both physical ... class encryption mechanism that accelerates security computation over the existing block cipher-based schemes with ... thereby offering a transparent and practical security computing platform...
  • FairplayMP

  • Referenced in 13 articles [sw11926]
  • FairplayMP: a system for secure multi-party computation. We present FairplayMP (for ”Fairplay Multi-Party ... system for secure multi-party computation. Secure computation is one of the great achievements ... which receives the inputs from the parties, computes the function, and privately informs the parties ... Fairplay system [16], which supported secure computation between two parties. The underlying protocol of FairplayMP...
  • EasyCrypt

  • Referenced in 32 articles [sw09738]
  • Computer-aided security proofs for the working cryptographer. We present EasyCrypt, an automated tool...
  • FLASH

  • Referenced in 46 articles [sw02233]
  • computed and checked by a low-cost smart card. The security is controversial, since ... security, but the best known attacks require more than 2 80 computations. We called FLASH ... even more careful about it’s security. FLASH and SFLASH have been accepted as submissions...
  • BitBlaze

  • Referenced in 11 articles [sw10059]
  • BitBlaze: Binary Analysis for Computer Security: Binary analysis is imperative for protecting COTS (common ... ground truth about program behavior since computers execute binaries (executables), not source code. However, binary ... effective solutions to applications beyond software security and malicious code defense, such as protocol reverse...
  • CMQV+

  • Referenced in 38 articles [sw06418]
  • CMQV+, which is proven secure under a weaker assumption (i.e. computational Diffie-Hellman assumption...
  • MiniLEGO

  • Referenced in 13 articles [sw09866]
  • Minilego: efficient secure two-party computation from general assumptions. One of the main tools ... construct secure two-party computation protocols are Yao garbled circuits. Using the cut-and-choose ... reasonably efficient Yao-based protocols with security against malicious adversaries. At TCC 2009, Nielsen...
  • Sharemind

  • Referenced in 13 articles [sw22617]
  • Sharemind: A framework for fast privacy-preserving computations. Gathering and processing sensitive data ... present a provably secure and efficient general-purpose computation system to address this problem ... standard way for securely evaluating functions in a multi-party computation environment. The novelty ... information-theoretically secure in the honest-but-curious model with three computing participants. Although...
  • VMCrypt

  • Referenced in 5 articles [sw16848]
  • VMCrypt: modular software architecture for scalable secure computation. Garbled circuit play a key role ... secure computation, but existing implementations do not scale and are not modular. In this paper ... present VMCrypt, a library for secure computation. This library introduces novel algorithms that, regardless ... gates. These are the largest scalable secure computations done to date...
  • HMQV

  • Referenced in 80 articles [sw02714]
  • which all the MQV’s security goals can be formally proved to hold ... random oracle model under the computational Diffie-Hellman assumption. We base the design and proof...
  • ObliVM

  • Referenced in 5 articles [sw29146]
  • ObliVM: A Programming Framework for Secure Computation. We design and develop Obli VM, a programming ... framework for secure computation. ObliVM offers a domain specific language designed for compilation of programs ... into efficient oblivious representations suitable for secure computation. ObliVM offers a powerful, expressive programming language...
  • Trustedpals

  • Referenced in 6 articles [sw09013]
  • TrustedPals: Secure Multiparty Computation Implemented with Smart Cards. We study the problem of Secure Multi ... corrupted party can stop the computation of its own security module as well as drop ... level of security modules. Since the critical part of the computation can be executed locally ... smart card, we can compute any function securely with a protocol complexity which is polynomial...
  • SCiFI

  • Referenced in 4 articles [sw33595]
  • introduce SCiFI, a system for Secure Computation of Face Identification. The system performs face identification ... public places. The system runs a secure computation of a face recognition algorithm, which identifies ... been specifically designed for usage in secure computation. Nonetheless, the algorithm has face recognition performance ... system - SCiFI, which implements a secure computation of the face identification protocol. 4. Experiments which...
  • Geppetto

  • Referenced in 10 articles [sw31791]
  • which allow a weak client to securely outsource computations to remote parties. Recent work...