Výsledky vyhledávání - "Theory of computation Computational complexity and cryptography Cryptographic protocols"
-
1
Primer: Fast Private Transformer Inference on Encrypted Data
Vydáno: IEEE 09.07.2023Vydáno v 2023 60th ACM/IEEE Design Automation Conference (DAC) (09.07.2023)“…It is increasingly important to enable privacy-preserving inference for cloud services based on Transformers. Post-quantum cryptographic techniques, e.g.,…”
Získat plný text
Konferenční příspěvek -
2
Optimizing windowed arithmetic for quantum attacks against RSA-2048
Vydáno: IEEE 22.06.2025Vydáno v 2025 62nd ACM/IEEE Design Automation Conference (DAC) (22.06.2025)“…Windowed arithmetic is a technique for reducing the cost of quantum arithmetic circuits with space-time trade-offs using memory queries to precomputed tables…”
Získat plný text
Konferenční příspěvek -
3
Optimized Polynomial Multiplier Architectures for Post-Quantum KEM Saber
Vydáno: IEEE 05.12.2021Vydáno v 2021 58th ACM/IEEE Design Automation Conference (DAC) (05.12.2021)“…Saber is one of the four finalists in the ongoing NIST post-quantum cryptography standardization project. A significant portion of Saber's computation time is…”
Získat plný text
Konferenční příspěvek -
4
zkVC: Fast Zero-Knowledge Proof for Private and Verifiable Computing
Vydáno: IEEE 22.06.2025Vydáno v 2025 62nd ACM/IEEE Design Automation Conference (DAC) (22.06.2025)“…In the context of cloud computing, services are held on cloud servers, where the clients send their data to the server and obtain the results returned by…”
Získat plný text
Konferenční příspěvek -
5
ZK-Hammer: Leaking Secrets from Zero-Knowledge Proofs via Rowhammer
Vydáno: IEEE 22.06.2025Vydáno v 2025 62nd ACM/IEEE Design Automation Conference (DAC) (22.06.2025)“…Zero-knowledge succinct non-interactive arguments of knowledge (zk-SNARK) schemes have been a promising technique in verified computation. Zk-SNARK schemes…”
Získat plný text
Konferenční příspěvek -
6
ALLMod: Exploring Area-Efficiency of LUT-based Large Number Modular Reduction via Hybrid Workloads
Vydáno: IEEE 22.06.2025Vydáno v 2025 62nd ACM/IEEE Design Automation Conference (DAC) (22.06.2025)“…Modular arithmetic, particularly modular reduction, is widely used in cryptographic applications such as homomorphic encryption (HE) and zero-knowledge proofs…”
Získat plný text
Konferenční příspěvek -
7
Lightning Talk: The Incredible Shrinking Black Box Model
Vydáno: IEEE 09.07.2023Vydáno v 2023 60th ACM/IEEE Design Automation Conference (DAC) (09.07.2023)“…A black box model is an assumption on the implementation of a cryptographic primitive to limit the capabilities of the attacker. Black boxes are a useful…”
Získat plný text
Konferenční příspěvek -
8
Invited: Accelerating Fully Homomorphic Encryption with Processing in Memory
Vydáno: IEEE 05.12.2021Vydáno v 2021 58th ACM/IEEE Design Automation Conference (DAC) (05.12.2021)“…Fully homomorphic encryption (FHE) provides a promising solution for future computing needs by allowing privacy-preserving computation. However, its practical…”
Získat plný text
Konferenční příspěvek -
9
NECTAR: non-interactive smart contract protocol using blockchain technology
ISBN: 9781450357265, 1450357261Vydáno: New York, NY, USA ACM 27.05.2018Vydáno v 2018 IEEE ACM 1st International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB) (27.05.2018)“…Blockchain-driven technologies are considered disruptive because of the availability of dis-intermediated, censorship-resistant and tamper-proof digital…”
Získat plný text
Konferenční příspěvek -
10
Decentralized Electronic Health Records Management via Redactable Blockchain and Revocable IPFS
ISSN: 2832-2975Vydáno: IEEE 19.06.2024Vydáno v IEEE/ACM Conference on Connected Health: Applications, Systems and Engineering Technologies (Online) (19.06.2024)“…The increasing integration of the Internet of Health Things (IoHT) in the eHealth sector has significantly advanced the collection of Electronic Health Records…”
Získat plný text
Konferenční příspěvek -
11
Evaluating the Integration of Aurora Zksnark in the Zupply Framework
Vydáno: IEEE 03.05.2025Vydáno v 2025 IEEE/ACM 6th International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS) (03.05.2025)“…The Zupply framework introduces an anonymous authentication protocol that utilizes zero-knowledge proofs to ensure data integrity, participant anonymity, and…”
Získat plný text
Konferenční příspěvek

