In this blog post we will discuss two papers which deal with a recent problem in cryptography. It is well understood that computation can be performed un untrusted servers using trusted hardware and oblivious RAM, but if a computation would benefit from being executed on a parallel architecture, it is...
[Read More]