-
I've been playing around with sealeddata and static-data-distribution. The latter is a very interesting example but quite meaningless because the rsa key is written to file in cleartext. I've tried to…
-
# Secret Boxes
## Project Description
This is a grant application for a set of templates called "secret boxes": **Secret Network Grant Program: Developer Tools**
We intend to create a home fo…
-
We are **Allowme**, a business unit from Tempest Security Intelligence, a cybersecurity company from Brazil, Latam, with more than 22 years in operation. Allowme's mission is to help companies protect…
-
## Request for Mozilla Position on an Emerging Web Specification
* Specification Title: Idle Detection API
* Specification or proposal URL: http://wicg.github.io/idle-detection
* Caniuse.com URL …
-
Hello,
I'm trying to run the tutorial test but the error occurred. (the picture below shows the problem)
Does anyone know the reason for the different parameter call?
To my knowledge, lvl0par…
-
请问secretflow有提供在密文上比较大小的接口吗
-
They are implemented using `impl_array_newtype` macro which just calls comparison methods from `core` which are not constant time. This seems to be a foot gun. `Hash` is also questionable - what if so…
-
## Description
The following topics should be researched:
- [Threshold Encryption (TE)](https://en.wikipedia.org/wiki/Threshold_cryptosystem)
- [Multi-Party Computation (MPC)](https://en.wikipedia.…
-
There are possibly two lines of security/cryptography works:
- The more theoretical side, creating new cryptographic primitives from basic assumptions.
- The more applied crypto side, leveraging…
-
See https://en.wikipedia.org/wiki/Yao%27s_Millionaires%27_Problem
Write a solution using HE in TFHE/HElib.
- Needs comparison gate #52
ots22 updated
6 years ago