Berkeley Engineering reports on the Security work done by Raluca, Jean-Luc and Sky: For your eyes only
“All you have to do is bring your cryptographic protocols to Piranha and then program on top of it. That’s why we say it’s really a platform. In this study, we implemented three protocols on top of Piranha to show that it works, but you could implement any protocols you wanted on top of it and still get the same acceleration benefits.”
Jean-Luc Watson