Filters








300 Hits in 4.6 sec

Optimal Rate Private Information Retrieval from Homomorphic Encryption

Aggelos Kiayias, Nikos Leonardos, Helger Lipmaa, Kateryna Pavlyk, Qiang Tang
<span title="2015-06-01">2015</span> <i title="Walter de Gruyter GmbH"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/feed3pdnijhbnm6huwkkxavghy" style="color: black;">Proceedings on Privacy Enhancing Technologies</a> </i> &nbsp;
These protocols are based on a new optimalrate leveled homomorphic encryption scheme for large-output polynomial-size branching programs, that might be of independent interest.  ...  We present first rate-optimal protocols for 1-out-of-n computationallyprivate information retrieval (CPIR), oblivious transfer (OT), and strong conditional oblivious transfer (SCOT).  ...  Acknowledgements We would like to thank Amir Herzberg and anonymous reviewers for useful comments. This research was performed while Leonardos and Tang were at the University of Athens.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1515/popets-2015-0016">doi:10.1515/popets-2015-0016</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/journals/popets/KiayiasLLPT15.html">dblp:journals/popets/KiayiasLLPT15</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/g7uy66menrbdbpemzot2vu75bq">fatcat:g7uy66menrbdbpemzot2vu75bq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180727050543/https://www.degruyter.com/downloadpdf/j/popets.2015.2015.issue-2/popets-2015-0016/popets-2015-0016.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ed/3e/ed3e873b445b6366b784315c231da56b40b9330c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1515/popets-2015-0016"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> degruyter.com </button> </a>

A Simpler Rate-Optimal CPIR Protocol [chapter]

Helger Lipmaa, Kateryna Pavlyk
<span title="">2017</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
First, [KLL + 15b] constructs a (leveled) homomorphic encryption scheme that allows to compute an arbitrary function f by constructing a w-ary branching program (for some small w n, e.g., w = 2) that computes  ...  Following [IP07], this homomorphic encryption scheme privately implements the (w, 1) multiplexer function, needed in every internal node of a branching program, by using a simple (w, 1)-CPIR protocol that  ...  large-output branching program.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-70972-7_35">doi:10.1007/978-3-319-70972-7_35</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/zqutpzqkevbclbyhep4lkd3cpa">fatcat:zqutpzqkevbclbyhep4lkd3cpa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190220131158/http://pdfs.semanticscholar.org/2410/fb1e23a36ac1b24fa4e13264b42ed0b10d25.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/24/10/2410fb1e23a36ac1b24fa4e13264b42ed0b10d25.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-70972-7_35"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Breaking the Circuit Size Barrier for Secure Computation Under DDH [chapter]

Elette Boyle, Niv Gilboa, Yuval Ishai
<span title="">2016</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
However, even this limited type of arithmetic branching programs can be useful for improving the asymptotic and concrete efficiency of homomorphic arithmetic computations. 4 We also realize a stronger  ...  Prior to our work, similar results could only be achieved using fully homomorphic encryption.  ...  We thank an anonymous reviewer for pointing out the relevance of [56] and Eric Allender for useful pointers regarding the power of the class ReachFewL.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-53018-4_19">doi:10.1007/978-3-662-53018-4_19</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/lwolomno3rfnzoiwe3reyznnuy">fatcat:lwolomno3rfnzoiwe3reyznnuy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170301135316/http://eprint.iacr.org:80/2016/585.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/57/48/57488549cfe6fa013e0f2712c406b506a26ad2d4.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-53018-4_19"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation [chapter]

Elette Boyle, Niv Gilboa, Yuval Ishai
<span title="">2017</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
In particular, they present succinct two-party protocols for securely computing branching programs and NC 1 circuits under the DDH assumption, providing the first alternative to fully homomorphic encryption  ...  The main result of [BGI16] is a DDH-based HSS scheme for branching programs, which in particular captures logspace and NC 1 computations.  ...  We also thank Geoffroy Couteau and the anonymous Eurocrypt reviewers for helpful comments.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-56614-6_6">doi:10.1007/978-3-319-56614-6_6</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/bhgipsvgsvd53caixzg45iybem">fatcat:bhgipsvgsvd53caixzg45iybem</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170710111755/http://eprint.iacr.org/2017/150.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ad/ad/adad39c82b59970f76216fbb4bb0567bb9a142cb.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-56614-6_6"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Accelerating Fully Homomorphic Encryption by Bridging Modular and Bit-Level Arithmetic [article]

Eduardo Chielle, Oleg Mazonka, Homer Gamil, Michail Maniatakos
<span title="2022-04-26">2022</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Recent advances in cryptography allow end-to-end processing of encrypted data without the need for decryption using Fully Homomorphic Encryption (FHE).  ...  Experimental results show that bridging modular and bit-level arithmetic computation can lead to 1-2 orders of magnitude performance improvement for tested synthetic benchmarks, as well as two real-world  ...  Paper roadmap: Section 2 introduces key concepts of homomorphic encryption, data-oblivious programming, and FHE schemes.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2204.12201v1">arXiv:2204.12201v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/f6dxujkquffcpdjb2tjxmdgdcq">fatcat:f6dxujkquffcpdjb2tjxmdgdcq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220503212426/https://arxiv.org/pdf/2204.12201v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d9/6b/d96ba8de3acc0cfa00bc57526040d9bfd8acaf70.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2204.12201v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Homomorphic Encryption [chapter]

Shai Halevi
<span title="">2017</span> <i title="Springer International Publishing"> Tutorials on the Foundations of Cryptography </i> &nbsp;
Fully homomorphic encryption (FHE) has been called the "Swiss Army knife of cryptography", since it provides a single tool that can be uniformly applied to many cryptographic applications.  ...  I owe special thanks to Yehuda for the initiative to write it.  ...  An interesting usage of techniques very similar to those described in this tutorial for the purpose of homomorphic commitments and signatures was described by Gorbunov et al. in [55] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-57048-8_5">doi:10.1007/978-3-319-57048-8_5</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/owa6tq4hl5aafmrrghnn5f6csq">fatcat:owa6tq4hl5aafmrrghnn5f6csq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190218061155/http://pdfs.semanticscholar.org/09ad/6b41fc80faa5f4d84079a6cb93f3c6e0b827.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/09/ad/09ad6b41fc80faa5f4d84079a6cb93f3c6e0b827.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-57048-8_5"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

High-Performance FV Somewhat Homomorphic Encryption on GPUs: An Implementation using CUDA

Ahmad Al Badawi, Bharadwaj Veeravalli, Chan Fook Mun, Khin Mi Mi Aung
<span title="2018-05-07">2018</span> <i title="Ruhr-Universität Bochum"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/yz7ssmvstjhsxiwixprnmyijnq" style="color: black;">Transactions on Cryptographic Hardware and Embedded Systems</a> </i> &nbsp;
Our implementation outperforms them and achieves on average 5.37x, 7.37x, 22.22x, 5.11x and 13.18x (resp. 2.03x, 2.94x, 27.86x, 8.53x and 18.69x) for key generation, encryption, decryption, homomorphic  ...  Homomorphic encryption (HE) offers great capabilities that can solve a wide range of privacy-preserving computing problems.  ...  Introduction Nearing 8 years since their introduction, Fully Homomorphic Encryption (FHE) schemes are set to revolutionize privacy-preserving computing by allowing one to perform arbitrary operations on  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.13154/tches.v2018.i2.70-95">doi:10.13154/tches.v2018.i2.70-95</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/journals/tches/BadawiVMA18.html">dblp:journals/tches/BadawiVMA18</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/r3pazuxa5nesnlicqub7mmxmqy">fatcat:r3pazuxa5nesnlicqub7mmxmqy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200109211607/https://tches.iacr.org/index.php/TCHES/article/download/875/827" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/de/51/de51d39858e642d2105f2d09eeb95d6625317948.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.13154/tches.v2018.i2.70-95"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

BASALISC: Flexible Asynchronous Hardware Accelerator for Fully Homomorphic Encryption [article]

Robin Geelen, Michiel Van Beirendonck, Hilder V. L. Pereira, Brian Huffman, Tynan McAuley, Ben Selfridge, Daniel Wagner, Georgios Dimou, Ingrid Verbauwhede, Frederik Vercauteren, David W. Archer
<span title="2022-05-27">2022</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Fully Homomorphic Encryption (FHE) allows for secure computation on encrypted data.  ...  The BASALISC computation units and inner memory layers are designed in asynchronous logic, allowing them to run at different speeds to optimize each function.  ...  FHE programs are deterministic: data dependencies do not exist since variables are encrypted, and hence all branches must be translated to some form of predicated execution.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2205.14017v1">arXiv:2205.14017v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/umeglxa3mzegtbzb64jvcin3oi">fatcat:umeglxa3mzegtbzb64jvcin3oi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220531050348/https://arxiv.org/pdf/2205.14017v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/83/24/83246f5106f908244f7219c66660c92c4abae83b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2205.14017v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities

Joseph I. Choi, Kevin R. B. Butler
<span title="2019-04-02">2019</span> <i title="Hindawi Limited"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/sdme5pnua5auzcsjgqmqefb66m" style="color: black;">Security and Communication Networks</a> </i> &nbsp;
Trusted execution environments (TEEs) provide hardware-enforced isolation of code and data in use, making them promising candidates for making SMC more tractable.  ...  The traditional enabler of SMC is cryptography, but the significant number of cryptographic operations required results in these techniques being impractical for most real-time, online computations.  ...  Acknowledgments Special thanks are due to Patrick Traynor and Thomas Shrimpton for their interest in and constructive criticisms of this work.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2019/1368905">doi:10.1155/2019/1368905</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/izynm6msrvehfa3ghkw7tykk34">fatcat:izynm6msrvehfa3ghkw7tykk34</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190503153550/http://downloads.hindawi.com/journals/scn/2019/1368905.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/fd/0e/fd0eacff6b5aba39408043d2f83c3b1901f4cf56.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2019/1368905"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> hindawi.com </button> </a>

A Comprehensive Survey on Secure Outsourced Computation and its Applications

Yang Yang, Xindi Huang, XiMeng Liu, Hongju Cheng, Jian Weng, Xiangyang Luo, Victor Chang
<span title="">2019</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/q7qi7j4ckfac7ehf3mjbso4hne" style="color: black;">IEEE Access</a> </i> &nbsp;
INDEX TERMS Secure outsourced computing, privacy preserving, homomorphic encryption, secure outsourced machine learning, data processing.  ...  Then, we focus on the theories and evolution of homomorphic encryption, as well as the applications of the basic operations and application-specific tasks.  ...  identification [33] , private linear branching programs [34] , privacy-preserving remote diagnosis [35] , and face recognition [36] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2019.2949782">doi:10.1109/access.2019.2949782</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ternbyhqezgd5cvhtfqfggqdqq">fatcat:ternbyhqezgd5cvhtfqfggqdqq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201107190947/https://ieeexplore.ieee.org/ielx7/6287639/8600701/08884162.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e2/ca/e2ca8a7d123ada5198788a8e19027fbdccfe04c1.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2019.2949782"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> ieee.com </button> </a>

Secure and federated linear mixed model association tests [article]

Jeffrey Chen, Manaswitha Edupalli, Bonnie Berger, Hyunghoon Cho
<span title="2022-05-24">2022</span> <i title="Cold Spring Harbor Laboratory"> bioRxiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Our work unlocks the promise of secure and distributed algorithms for collaborative genomic studies.  ...  Privacy-preserving algorithms for genome-wide association studies (GWAS) promise to facilitate data sharing across silos to accelerate new discoveries.  ...  homomorphic encryption schemes.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1101/2022.05.20.492837">doi:10.1101/2022.05.20.492837</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/g646msmkdnf3jkpz2nliyc2lau">fatcat:g646msmkdnf3jkpz2nliyc2lau</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220525072754/https://www.biorxiv.org/content/biorxiv/early/2022/05/24/2022.05.20.492837.full.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/60/e1/60e1288161aa082f4024dae7dd501dc1f4da50c0.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1101/2022.05.20.492837"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> biorxiv.org </button> </a>

Public Key Cryptography on Hardware Platforms: Design and Analysis of Elliptic Curve and Lattice-based Cryptoprocessors

Sujoy Sinha Roy
<span title="2017-05-01">2017</span> <i title="Zenodo"> Zenodo </i> &nbsp;
We design an FPGA-based accelerator for the homomorphic encryption scheme YASHE.  ...  Then we propose a more practical scheme that uses a special module to assist homomorphic function evaluation in less time. With this module we can evaluate encrypted search roughly [...]  ...  A.2 Hardware architecture We use these optimizations to design a high-speed and pipelined scalar conversion architecture. The architecture is described in details our publication  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.2643389">doi:10.5281/zenodo.2643389</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/sozmpjtc3jbddpgdqa7cic24k4">fatcat:sozmpjtc3jbddpgdqa7cic24k4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200302064058/https://zenodo.org/record/2643390/files/thesis-288.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d5/6d/d56d2734c097e632682aa1acaf0aafb72638252b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.2643389"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> zenodo.org </button> </a>

Attack Determination and its Security Analysis for Personal Communication in VoIP Networks

Dr.K. Venkatachalapathy
<span title="">2013</span> <i title="IOSR Journals"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/vabuspdninc75epczdurccts4u" style="color: black;">IOSR Journal of Computer Engineering</a> </i> &nbsp;
We use AES algorithm, which is moderate than DES and comprices high performance compared to Triple DES for encrypting a voice packets at the level of end-to-end media encryption.  ...  SRTP achieves high throughput and low packet expansion by using fast-stream ciphers for encryption, an implicit index for synchronization, and universal hash functions for message authentication.  ...  Alone for their valuable guidance and for providing all the necessary facilities, which were indispensable in the completion of this project.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.9790/0661-0920109">doi:10.9790/0661-0920109</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/atnqdia7kbhbtghde74ong6qry">fatcat:atnqdia7kbhbtghde74ong6qry</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20130904004213/http://iosrjournals.org/iosr-jce/full-issue/vol9-issue2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/3a/9c/3a9cc07159989506e87982c84475199dd3e5aad1.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.9790/0661-0920109"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Security in Approximate Computing and Approximate Computing for Security: Challenges and Opportunities

Weiqiang Liu, Chongyan Gu, Maire O'Neill, Gang Qu, Paolo Montuschi, Fabrizio Lombardi
<span title="">2020</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/yfvtieuumfamvmjlc255uckdlm" style="color: black;">Proceedings of the IEEE</a> </i> &nbsp;
Homomorphic Encryption (HE): Homomorphic encryption is a cryptographic approach that can perform calculations directly on encrypted data without needing to decrypt the data first.  ...  Encryption: [79] proposed a homomorphic encryption scheme using approximate arithmetic based on the RLWE.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/jproc.2020.3030121">doi:10.1109/jproc.2020.3030121</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/vgxrxqkoibhgflrwq6rrfz7ofm">fatcat:vgxrxqkoibhgflrwq6rrfz7ofm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210427172208/https://pureadmin.qub.ac.uk/ws/files/219941559/Security.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/7c/a7/7ca76530029f8854cd88649d158721629363d8a7.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/jproc.2020.3030121"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

A Survey on RISC-V Security: Hardware and Architecture [article]

Tao Lu
<span title="2021-07-09">2021</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
For decades, these processors were mainly based on the Arm instruction set architecture (ISA).  ...  Based on the famous Torus Fully Homomorphic Encryption (TFHE) scheme, VSP allows any user with any C program to execute its code in SCO mode.  ...  Clients and service providers can use encryption technologies such as homomorphic encryption (HE) [119] and secure multi-party computing (SMPC) [120] to securely process private inputs under encryption  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2107.04175v1">arXiv:2107.04175v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/hr6avyprj5dvpav2pvnmfmvg2a">fatcat:hr6avyprj5dvpav2pvnmfmvg2a</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210713230306/https://arxiv.org/pdf/2107.04175v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/2e/50/2e50675439a2bf21e5f2b80be26af4b66d2d8fce.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2107.04175v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 300 results