"Claudio Orlandi" <[EMAIL PROTECTED]> writes:
Hi Claudio
> if you are interested just in passive security for the 2 party case
> you can implement the following protocol for multiplication.
You never commented on my implementation of your multiplication
protocol -- is there anything I should kno
Ivan Bjerre Damgaard <[EMAIL PROTECTED]> writes:
> Quoting Martin Geisler <[EMAIL PROTECTED]>:
>
>> "Claudio Orlandi" <[EMAIL PROTECTED]> writes:
>>
>> >> From reading the Wikipedia page linked below it seems very
>> >> simple to implement. But if it should be fast, then a library is
>> >> of cour
Quoting Martin Geisler <[EMAIL PROTECTED]>:
> "Claudio Orlandi" <[EMAIL PROTECTED]> writes:
>
> >> From reading the Wikipedia page linked below it seems very simple
> >> to implement. But if it should be fast, then a library is of course
> >> much better than a home-grown Python version.
A genera