Cryptology ePrint Archive: Report 2013/046
Available versions in chronological order
20130130:031717 (posted 30-Jan-2013 03:17:17 UTC)
Fast and Maliciously Secure Two-Party Computation Using the GPU
Tore Kasper Frederiksen and Jesper Buus Nielsen
20130205:152220 (posted 05-Feb-2013 15:22:20 UTC)
Fast and Maliciously Secure Two-Party Computation Using the GPU
Tore Kasper Frederiksen and Jesper Buus Nielsen
20130206:120329 (posted 06-Feb-2013 12:03:29 UTC)
Fast and Maliciously Secure Two-Party Computation Using the GPU
Tore Kasper Frederiksen and Jesper Buus Nielsen
20130215:121727 (posted 15-Feb-2013 12:17:27 UTC)
Fast and Maliciously Secure Two-Party Computation Using the GPU
Tore Kasper Frederiksen and Jesper Buus Nielsen
20130429:093452 (posted 29-Apr-2013 09:34:52 UTC)
Fast and Maliciously Secure Two-Party Computation Using the GPU
Tore Kasper Frederiksen and Jesper Buus Nielsen
20131128:175129 (posted 28-Nov-2013 17:51:29 UTC)
Fast and Maliciously Secure Two-Party Computation Using the GPU
Tore Kasper Frederiksen and Jesper Buus Nielsen
Original publication (with major differences): ACNS
20131129:154610 (posted 29-Nov-2013 15:46:10 UTC)
Fast and Maliciously Secure Two-Party Computation Using the GPU
Tore Kasper Frederiksen and Jesper Buus Nielsen
Original publication (with major differences): ACNS
20131227:131409 (posted 27-Dec-2013 13:14:09 UTC)
Fast and Maliciously Secure Two-Party Computation Using the GPU
Tore Kasper Frederiksen and Jesper Buus Nielsen
Original publication (with major differences): ACNS
20131230:111126 (posted 30-Dec-2013 11:11:26 UTC)
Fast and Maliciously Secure Two-Party Computation Using the GPU
Tore Kasper Frederiksen and Jesper Buus Nielsen
Original publication (with major differences): ACNS
[
Cryptology ePrint archive
]