2PC | Secure Two-party computation |
A2M | Addition-to-Multiplication |
AES | Advanced Encryption Standard |
DEAP | Dual Execution with Asymmetric Privacy |
ECB | Electronic codebook (encryption mode) |
ECDH | Elliptic-Curve Diffie-Hellman |
GC | Garbled Circuit |
GCM | Galois/Counter Mode |
GHASH | GCM hash |
HMAC | Hash-based Message Authentication Code |
M2a | Multiplication-to-Addition |
MAC | Message Authentication Code |
MPC | Secure Multi-party computation |
OT | oblivious transfer |
PMS | Pre master secret (TLS) |
PRF | Pseudo Random Function |
PRG | pseudorandom generator |
PSE | Privacy and Scaling Exploration |
RSA | Rivest–Shamir–Adleman (public-key cryptosystem) |
TLS | transport layer security |