Good mix of approaches this time, including custom secure computation protocols, secure enclaves, and differential privacy.

Papers

Previous post

Weekly Digs #6