Glossary

TermExplanation
2PCSecure Two-party computation
A2MAddition-to-Multiplication
AESAdvanced Encryption Standard
DEAPDual Execution with Asymmetric Privacy
ECBElectronic codebook (encryption mode)
ECDHElliptic-Curve Diffie-Hellman
GCGarbled Circuit
GCMGalois/Counter Mode
GHASHGCM hash
HMACHash-based Message Authentication Code
M2aMultiplication-to-Addition
MACMessage Authentication Code
MPCSecure Multi-party computation
OToblivious transfer
PMSPre master secret (TLS)
PRFPseudo Random Function
PRGpseudorandom generator
PSEPrivacy and Scaling Exploration
RSARivest–Shamir–Adleman (public-key cryptosystem)
TLStransport layer security