Open in app

Sign In

Write

Sign In

Andrei Lapets
Andrei Lapets

13 Followers

Home

About

Published in Nth Party, Ltd.

·Jul 21, 2021

Accessible and Scalable Secure Data Evaluation

Infutor protects customer data using multi-party computation — Members of the Nth Party team have spent the last six years building and enhancing libraries, applications, and products that deliver or incorporate secure multi-party computation (MPC) protocols and capabilities. More recently, browser-based tools released by Nth Party (such as nth.link) …

Secure Computation

4 min read

Accessible and Scalable Secure Data Evaluation
Accessible and Scalable Secure Data Evaluation
Secure Computation

4 min read


Published in Nth Party, Ltd.

·Oct 30, 2020

Privacy-Preserving Information Exchange Using Python

Imagine a scenario involving a vendor that offers two distinct digital products for sale at the same price (such as mobile apps or digital content) and a customer that would like to purchase exactly one of these two products. Furthermore, suppose that the customer and vendor are interested in performing…

Cryptography

5 min read

Privacy-Preserving Information Exchange Using Python
Privacy-Preserving Information Exchange Using Python
Cryptography

5 min read


Published in Python Supply

·Oct 29, 2020

Guide to Publishing Packages

This article is a step-by-step guide to assembling and publishing a small, open-source Python package. While not all of the steps below will be appropriate or desirable for every package, each of these can contribute to the accessibility and maintainability of the package. Note that this material is meant to…

Python

8 min read

Guide to Publishing Packages
Guide to Publishing Packages
Python

8 min read


Published in Nth Party, Ltd.

·Sep 30, 2020

Privacy-Preserving Matching and Computation in the Browser

There are a variety of obstacles that can make it a challenge to deliver the benefits of privacy-preserving secure computation capabilities to organizations. These can include a lengthy process for obtaining approval to install new software, the cost and personnel effort associated with provisioning new cloud resources, and the technical…

Cryptography

4 min read

Privacy-Preserving Matching and Computation in the Browser
Privacy-Preserving Matching and Computation in the Browser
Cryptography

4 min read


Published in Python Supply

·Sep 30, 2020

Applications of Immutability

Suppose you are implementing a service that works with data sets that represent routes on a map (e.g., collections of driving directions or logs of past trips). The road network is represented as a graph with nodes and edges, and each route is conceptually a collection of edges. …

Programming

10 min read

Programming

10 min read


Published in Python Supply

·Aug 27, 2020

Comprehensions and Combinations

If you are working on a project in which you must enumerate, traverse, and/or test every possible combination of elements from one or more finite (or even infinite) collections, Python provides a variety of ways to do so. This article reviews some of the syntactically concise ways to do so…

Python

7 min read

Comprehensions and Combinations
Comprehensions and Combinations
Python

7 min read


Published in Nth Party, Ltd.

·Aug 5, 2020

Tools for Organizations in a Rapidly Evolving Data Privacy Landscape

Privacy-enhancing and secure computation technologies are ready today to transform your workflows and services. — By building and deploying web services or data analysis workflows that employ emerging privacy-enhancing and secure computation technologies such as secure multi-party computation (MPC), organizations can provide new services, identify and leverage new business opportunities, reduce risks and costs for both themselves and their customers, and comply with evolving regulations…

Cryptography

5 min read

Cryptography

5 min read


Published in Python Supply

·Jul 30, 2020

Working with Foreign Functions

Suppose your Python library needs to load some sensitive binary data from a file into a contiguous block of memory (e.g., in order to use it for some application-specific operation). Furthermore, you have some additional requirements that must be met for security and auditing purposes: you need to ensure that…

Python

6 min read

Working with Foreign Functions
Working with Foreign Functions
Python

6 min read


Published in Reity LLC

·Jun 29, 2020

Permutation Circuit Synthesis via Embedded Languages and Recursion

The ability to synthesize logical circuits as data structures (without any intention of implementing such circuits as hardware) is becoming increasingly relevant as technologies such as garbled circuit protocols and quantum computing platforms begin to mature. …

Programming

6 min read

Programming

6 min read


Published in Python Supply

·Jun 15, 2020

Static Checking via Metaclasses

Suppose you are maintaining a domain-specific machine learning library. Users of the library’s API expect that every machine learning algorithm offered by the API will have the same interface (i.e., the same methods with the same signatures) regardless of its underlying implementation. …

Python

6 min read

Python

6 min read

Andrei Lapets

Andrei Lapets

13 Followers

https://lapets.io

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech