Suchergebnisse - Theory of computation Computational complexity and cryptography Cryptographic protocols

  1. 1

    Primer: Fast Private Transformer Inference on Encrypted Data von Zheng, Mengxin, Lou, Qian, Jiang, Lei

    Veröffentlicht: IEEE 09.07.2023
    “… In particular, Primer is constructed by a hybrid cryptographic protocol optimized for attention-based Transformer models, as well as techniques including computation merge and tokens-first ciphertext packing …”
    Volltext
    Tagungsbericht
  2. 2

    Optimizing windowed arithmetic for quantum attacks against RSA-2048 von Luongo, Alessandro, Narasimhachar, Varun, Sireesh, Adithya

    Veröffentlicht: IEEE 22.06.2025
    “… in the current state-of-the-art compilations of quantum attacks against modern cryptography. We introduce several optimizations to windowed arithmetic …”
    Volltext
    Tagungsbericht
  3. 3

    ZK-Hammer: Leaking Secrets from Zero-Knowledge Proofs via Rowhammer von Liang, Junkai, Zhang, Xin, Hu, Daqi, Shen, Qingni, Fang, Yuejian, Wu, Zhonghai

    Veröffentlicht: IEEE 22.06.2025
    “… Zero-knowledge succinct non-interactive arguments of knowledge (zk-SNARK) schemes have been a promising technique in verified computation …”
    Volltext
    Tagungsbericht
  4. 4

    zkVC: Fast Zero-Knowledge Proof for Private and Verifiable Computing von Zhang, Yancheng, Zheng, Mengxin, Chen, Xun, Hu, Jingtong, Shi, Weidong, Ju, Lei, Solihin, Yan, Lou, Qian

    Veröffentlicht: IEEE 22.06.2025
    “… However, the computation, data and results are prone to tampering due to the vulnerabilities on the server side …”
    Volltext
    Tagungsbericht
  5. 5

    Optimized Polynomial Multiplier Architectures for Post-Quantum KEM Saber von Basso, Andrea, Roy, Sujoy Sinha

    Veröffentlicht: IEEE 05.12.2021
    “… Saber is one of the four finalists in the ongoing NIST post-quantum cryptography standardization project …”
    Volltext
    Tagungsbericht
  6. 6

    ALLMod: Exploring Area-Efficiency of LUT-based Large Number Modular Reduction via Hybrid Workloads von Liu, Fangxin, Li, Haomin, Wang, Zongwu, Zhang, Bo, Zhang, Mingzhe, Yan, Shoumeng, Jiang, Li, Guan, Haibing

    Veröffentlicht: IEEE 22.06.2025
    “… Modular arithmetic, particularly modular reduction, is widely used in cryptographic applications such as homomorphic encryption …”
    Volltext
    Tagungsbericht
  7. 7

    Invited: Accelerating Fully Homomorphic Encryption with Processing in Memory von Gupta, Saransh, Rosing, Tajana Simunic

    Veröffentlicht: IEEE 05.12.2021
    “… Fully homomorphic encryption (FHE) provides a promising solution for future computing needs by allowing privacy-preserving computation …”
    Volltext
    Tagungsbericht
  8. 8

    Lightning Talk: The Incredible Shrinking Black Box Model von Schaumont, Patrick

    Veröffentlicht: IEEE 09.07.2023
    “… A black box model is an assumption on the implementation of a cryptographic primitive to limit the capabilities of the attacker …”
    Volltext
    Tagungsbericht
  9. 9

    NECTAR: non-interactive smart contract protocol using blockchain technology von Covaci, Alexandra, Madeo, Simone, Motylinski, Patrick, Vincent, Stéphane

    ISBN: 9781450357265, 1450357261
    Veröffentlicht: New York, NY, USA ACM 27.05.2018
    “… In this paper, we introduce a novel protocol aiming to execute smart contracts as part of a blockchain transaction validation …”
    Volltext
    Tagungsbericht
  10. 10

    Evaluating the Integration of Aurora Zksnark in the Zupply Framework von Badakhshan, Mohammadtaghi, Gong, Guang

    Veröffentlicht: IEEE 03.05.2025
    “… The Zupply framework introduces an anonymous authentication protocol that utilizes zero-knowledge proofs to ensure data integrity, participant anonymity, and unlinkability within supply chains …”
    Volltext
    Tagungsbericht
  11. 11

    Decentralized Electronic Health Records Management via Redactable Blockchain and Revocable IPFS von Guo, Hao, Li, Wanxin, Meese, Collin, Nejad, Mark

    ISSN: 2832-2975
    Veröffentlicht: IEEE 19.06.2024
    “… We implemented the proposed system based on the Charm cryptographic library and revocable …”
    Volltext
    Tagungsbericht
  12. 12

    Interactive cryptographic proofs of quantumness using mid-circuit measurements von Zhu, Daiwei, Kahanamoku-Meyer, Gregory D, Lewis, Laura, Noel, Crystal, Katz, Or, Harraz, Bahaa, Wang, Qingfeng, Risinger, Andrew, Feng, Lei, Biswas, Debopriyo, Egan, Laird, Gheorghiu, Alexandru, Nam, Yunseong, Vidick, Thomas, Vazirani, Umesh, Yao, Norman Y, Cetina, Marko, Monroe, Christopher

    ISSN: 1745-2473, 1745-2481
    Veröffentlicht: London Nature Publishing Group 01.11.2023
    Veröffentlicht in Nature physics (01.11.2023)
    “… Here we apply mid-circuit measurements for a particular task: demonstrating quantum computational advantage …”
    Volltext
    Journal Article
  13. 13

    Secure Comparison Protocols in the Semi-Honest Model von Veugen, Thijs, Blom, Frank, de Hoogh, Sebastiaan J. A., Erkin, Zekeriya

    ISSN: 1932-4553, 1941-0484
    Veröffentlicht: New York IEEE 01.10.2015
    “… Due to high complexity, comparison protocols with secret inputs have been a bottleneck in the design of privacy-preserving cryptographic protocols …”
    Volltext
    Journal Article
  14. 14

    Probabilistic Termination and Composability of Cryptographic Protocols von Cohen, Ran, Coretti, Sandro, Garay, Juan, Zikas, Vassilis

    ISSN: 0933-2790, 1432-1378
    Veröffentlicht: New York Springer US 15.07.2019
    Veröffentlicht in Journal of cryptology (15.07.2019)
    “… When analyzing the round complexity of multi-party protocols, one often overlooks the fact that underlying resources, such as a broadcast channel, can by themselves be expensive to implement …”
    Volltext
    Journal Article
  15. 15

    Round-Preserving Parallel Composition of Probabilistic-Termination Cryptographic Protocols von Cohen, Ran, Coretti, Sandro, Garay, Juan, Zikas, Vassilis

    ISSN: 0933-2790, 1432-1378
    Veröffentlicht: New York Springer US 01.04.2021
    Veröffentlicht in Journal of cryptology (01.04.2021)
    “… An important benchmark for multi-party computation protocols (MPC) is their round complexity …”
    Volltext
    Journal Article
  16. 16

    More Efficient Oblivious Transfer Extensions von Asharov, Gilad, Lindell, Yehuda, Schneider, Thomas, Zohner, Michael

    ISSN: 0933-2790, 1432-1378
    Veröffentlicht: New York Springer US 01.07.2017
    Veröffentlicht in Journal of cryptology (01.07.2017)
    “… Oblivious transfer (OT) is one of the most fundamental primitives in cryptography and is widely used in protocols for secure two-party and multi-party computation …”
    Volltext
    Journal Article
  17. 17

    The Round Complexity of Perfect MPC with Active Security and Optimal Resiliency von Applebaum, Benny, Kachlon, Eliran, Patra, Arpita

    ISSN: 2575-8454
    Veröffentlicht: IEEE 01.11.2020
    “… We study the round complexity of general secure multiparty computation in the BGW model. Our main result shows that every functionality can be realized in only four …”
    Volltext
    Tagungsbericht
  18. 18

    Verification of Quantum Computation: An Overview of Existing Approaches von Gheorghiu, Alexandru, Kapourniotis, Theodoros, Kashefi, Elham

    ISSN: 1432-4350, 1433-0490
    Veröffentlicht: New York Springer US 01.05.2019
    Veröffentlicht in Theory of computing systems (01.05.2019)
    “… We also comment on the use of cryptographic techniques which, for many of the presented protocols, has proven extremely useful in performing verification. Finally, we discuss issues related to fault tolerance, experimental implementations and the outlook for future protocols …”
    Volltext
    Journal Article
  19. 19

    A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems von Cortier, Véronique, Kremer, Steve, Warinschi, Bogdan

    ISSN: 0168-7433, 1573-0670
    Veröffentlicht: Dordrecht Springer Netherlands 01.04.2011
    Veröffentlicht in Journal of automated reasoning (01.04.2011)
    “… One of the approaches relies on a computational model that considers issues of complexity and probability …”
    Volltext
    Journal Article
  20. 20

    Decision and Complexity of Dolev-Yao Hyperproperties von Rakotonirina, Itsaka, Barthe, Gilles, Schneidewind, Clara

    ISSN: 2475-1421, 2475-1421
    Veröffentlicht: New York, NY, USA ACM 02.01.2024
    Veröffentlicht in Proceedings of ACM on programming languages (02.01.2024)
    “… The formal analysis of cryptographic protocols traditionally focuses on trace and equivalence properties, for which decision procedures in the symbolic (or Dolev-Yao, or DY) model are known …”
    Volltext
    Journal Article