Weekly Digs #5

Good mix of approaches this time, including custom secure computation protocols, secure enclaves, and differential privacy.

Papers