-
From https://github.com/enigmampc/protocol-discovery/blob/master/docs/source/howitworks.rst
How it Works
As described in the Introduction, the Enigma Network offloads private computation tasks fro…
-
Hi,this is my first submission. Just started with a first version of shamir secret sharing.
The idea is to add more secure multiparty computation (SMC) primitives in crypto.
If OK, there is more to …
-
-
I am looking at GEMM computations in EVA.
EVA uses vectorised computations, though following the paper [Secure Outsourced Matrix Computation and Application to Neural Networks](https://dl.acm.org…
-
[BIP98 Fast Merkle Trees](https://github.com/bitcoin/bips/blob/master/bip-0098.mediawiki) introduces the concept of fast merkle trees which essentially do not use double-sha256 but fast-sha256 for inn…
-
According to [R. Piessens and M. Branders, On the computation of Fourier transforms of singular functions, *J. Comp. Appl. Math.*, **43**:159-169, 1992](https://www.sciencedirect.com/science/article/p…
-
## Question
is it possible to train a neural network on encrypted values using Secure Multi-Party Computation and Autograd?
## Further Information
I found a blog from pysyft that can perform encr…
-
## Observed vs. expected behavior
When using ```JPAQuery.orderBy``` with user provided input there is a possibility to inject ```HQL``` query, which is then executed in database.
## Steps to repro…
-
KubeVela is an excellent server-side solution for OAM. It has many advantages like centralized management and high availability. But we believe client-side solution is also very useful in some scenari…
-
reason:
* old descriptions from years ago may not make users click on it or more
todo:
* find existing places where Gridcoin source is used
* e.g. @caraka 's PPA
example:
* currently the […