Suchergebnisse - Theory of computation Computational complexity and cryptography Cryptographic protocols
-
1
Primer: Fast Private Transformer Inference on Encrypted Data
Veröffentlicht: IEEE 09.07.2023Veröffentlicht in 2023 60th ACM/IEEE Design Automation Conference (DAC) (09.07.2023)“… In particular, Primer is constructed by a hybrid cryptographic protocol optimized for attention-based Transformer models, as well as techniques including computation merge and tokens-first ciphertext packing …”
Volltext
Tagungsbericht -
2
Optimizing windowed arithmetic for quantum attacks against RSA-2048
Veröffentlicht: IEEE 22.06.2025Veröffentlicht in 2025 62nd ACM/IEEE Design Automation Conference (DAC) (22.06.2025)“… in the current state-of-the-art compilations of quantum attacks against modern cryptography. We introduce several optimizations to windowed arithmetic …”
Volltext
Tagungsbericht -
3
ZK-Hammer: Leaking Secrets from Zero-Knowledge Proofs via Rowhammer
Veröffentlicht: IEEE 22.06.2025Veröffentlicht in 2025 62nd ACM/IEEE Design Automation Conference (DAC) (22.06.2025)“… Zero-knowledge succinct non-interactive arguments of knowledge (zk-SNARK) schemes have been a promising technique in verified computation …”
Volltext
Tagungsbericht -
4
zkVC: Fast Zero-Knowledge Proof for Private and Verifiable Computing
Veröffentlicht: IEEE 22.06.2025Veröffentlicht in 2025 62nd ACM/IEEE Design Automation Conference (DAC) (22.06.2025)“… However, the computation, data and results are prone to tampering due to the vulnerabilities on the server side …”
Volltext
Tagungsbericht -
5
Optimized Polynomial Multiplier Architectures for Post-Quantum KEM Saber
Veröffentlicht: IEEE 05.12.2021Veröffentlicht in 2021 58th ACM/IEEE Design Automation Conference (DAC) (05.12.2021)“… Saber is one of the four finalists in the ongoing NIST post-quantum cryptography standardization project …”
Volltext
Tagungsbericht -
6
ALLMod: Exploring Area-Efficiency of LUT-based Large Number Modular Reduction via Hybrid Workloads
Veröffentlicht: IEEE 22.06.2025Veröffentlicht in 2025 62nd ACM/IEEE Design Automation Conference (DAC) (22.06.2025)“… Modular arithmetic, particularly modular reduction, is widely used in cryptographic applications such as homomorphic encryption …”
Volltext
Tagungsbericht -
7
Invited: Accelerating Fully Homomorphic Encryption with Processing in Memory
Veröffentlicht: IEEE 05.12.2021Veröffentlicht in 2021 58th ACM/IEEE Design Automation Conference (DAC) (05.12.2021)“… Fully homomorphic encryption (FHE) provides a promising solution for future computing needs by allowing privacy-preserving computation …”
Volltext
Tagungsbericht -
8
Lightning Talk: The Incredible Shrinking Black Box Model
Veröffentlicht: IEEE 09.07.2023Veröffentlicht in 2023 60th ACM/IEEE Design Automation Conference (DAC) (09.07.2023)“… A black box model is an assumption on the implementation of a cryptographic primitive to limit the capabilities of the attacker …”
Volltext
Tagungsbericht -
9
NECTAR: non-interactive smart contract protocol using blockchain technology
ISBN: 9781450357265, 1450357261Veröffentlicht: New York, NY, USA ACM 27.05.2018Veröffentlicht in 2018 IEEE ACM 1st International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB) (27.05.2018)“… In this paper, we introduce a novel protocol aiming to execute smart contracts as part of a blockchain transaction validation …”
Volltext
Tagungsbericht -
10
Evaluating the Integration of Aurora Zksnark in the Zupply Framework
Veröffentlicht: IEEE 03.05.2025Veröffentlicht in 2025 IEEE/ACM 6th International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS) (03.05.2025)“… The Zupply framework introduces an anonymous authentication protocol that utilizes zero-knowledge proofs to ensure data integrity, participant anonymity, and unlinkability within supply chains …”
Volltext
Tagungsbericht -
11
Decentralized Electronic Health Records Management via Redactable Blockchain and Revocable IPFS
ISSN: 2832-2975Veröffentlicht: IEEE 19.06.2024Veröffentlicht in IEEE/ACM Conference on Connected Health: Applications, Systems and Engineering Technologies (Online) (19.06.2024)“… We implemented the proposed system based on the Charm cryptographic library and revocable …”
Volltext
Tagungsbericht -
12
Interactive cryptographic proofs of quantumness using mid-circuit measurements
ISSN: 1745-2473, 1745-2481Veröffentlicht: London Nature Publishing Group 01.11.2023Veröffentlicht in Nature physics (01.11.2023)“… Here we apply mid-circuit measurements for a particular task: demonstrating quantum computational advantage …”
Volltext
Journal Article -
13
Secure Comparison Protocols in the Semi-Honest Model
ISSN: 1932-4553, 1941-0484Veröffentlicht: New York IEEE 01.10.2015Veröffentlicht in IEEE journal of selected topics in signal processing (01.10.2015)“… Due to high complexity, comparison protocols with secret inputs have been a bottleneck in the design of privacy-preserving cryptographic protocols …”
Volltext
Journal Article -
14
Probabilistic Termination and Composability of Cryptographic Protocols
ISSN: 0933-2790, 1432-1378Veröffentlicht: New York Springer US 15.07.2019Veröffentlicht in Journal of cryptology (15.07.2019)“… When analyzing the round complexity of multi-party protocols, one often overlooks the fact that underlying resources, such as a broadcast channel, can by themselves be expensive to implement …”
Volltext
Journal Article -
15
Round-Preserving Parallel Composition of Probabilistic-Termination Cryptographic Protocols
ISSN: 0933-2790, 1432-1378Veröffentlicht: New York Springer US 01.04.2021Veröffentlicht in Journal of cryptology (01.04.2021)“… An important benchmark for multi-party computation protocols (MPC) is their round complexity …”
Volltext
Journal Article -
16
More Efficient Oblivious Transfer Extensions
ISSN: 0933-2790, 1432-1378Veröffentlicht: New York Springer US 01.07.2017Veröffentlicht in Journal of cryptology (01.07.2017)“… Oblivious transfer (OT) is one of the most fundamental primitives in cryptography and is widely used in protocols for secure two-party and multi-party computation …”
Volltext
Journal Article -
17
The Round Complexity of Perfect MPC with Active Security and Optimal Resiliency
ISSN: 2575-8454Veröffentlicht: IEEE 01.11.2020Veröffentlicht in Proceedings / annual Symposium on Foundations of Computer Science (01.11.2020)“… We study the round complexity of general secure multiparty computation in the BGW model. Our main result shows that every functionality can be realized in only four …”
Volltext
Tagungsbericht -
18
Verification of Quantum Computation: An Overview of Existing Approaches
ISSN: 1432-4350, 1433-0490Veröffentlicht: New York Springer US 01.05.2019Veröffentlicht in Theory of computing systems (01.05.2019)“… We also comment on the use of cryptographic techniques which, for many of the presented protocols, has proven extremely useful in performing verification. Finally, we discuss issues related to fault tolerance, experimental implementations and the outlook for future protocols …”
Volltext
Journal Article -
19
A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems
ISSN: 0168-7433, 1573-0670Veröffentlicht: Dordrecht Springer Netherlands 01.04.2011Veröffentlicht in Journal of automated reasoning (01.04.2011)“… One of the approaches relies on a computational model that considers issues of complexity and probability …”
Volltext
Journal Article -
20
Decision and Complexity of Dolev-Yao Hyperproperties
ISSN: 2475-1421, 2475-1421Veröffentlicht: New York, NY, USA ACM 02.01.2024Veröffentlicht in Proceedings of ACM on programming languages (02.01.2024)“… The formal analysis of cryptographic protocols traditionally focuses on trace and equivalence properties, for which decision procedures in the symbolic (or Dolev-Yao, or DY) model are known …”
Volltext
Journal Article

