Towards more Practical Secure Computation: Efficient Protocols for Secure Linear Algebra
“Secure Computation” has been a classic and central question in modern cryptography with a large set of potential applications. Mining large genomic databases, private scientific computation, and studying properties of shared networks are just a…
Candidate Talk
In the recent past, anti-P2P companies have successfully curtailed the distribution of targeted content over a number of P2P file-sharing systems, including Kazaa and eDonkey. More recently, anti-P2P companies have begun to attack BitTorrent. In…
The Sage Mathematical Software Project
Sage is a large mathematical software project based at the University of Washington that is funded by Microsoft, the National Science Foundation, and other organizations. The longterm goal of Sage is provide a viable free…
Arithmetic Intersection and a conjecture of Lauter
Motivated by her joint work with H. Cohn on genus two curve crypotosystem, Lauter gave a very inspiring conjecture on the CM value of Igusa invariants. They need to compute these values to construct `good’…