Výsledky vyhledávání - "Theory of computation Computational complexity and cryptography Cryptographic protocols"

  • Zobrazuji výsledky 1 - 11 z 11
Upřesnit hledání
  1. 1

    Primer: Fast Private Transformer Inference on Encrypted Data Autor Zheng, Mengxin, Lou, Qian, Jiang, Lei

    Vydáno: IEEE 09.07.2023
    “…It is increasingly important to enable privacy-preserving inference for cloud services based on Transformers. Post-quantum cryptographic techniques, e.g.,…”
    Získat plný text
    Konferenční příspěvek
  2. 2

    Optimizing windowed arithmetic for quantum attacks against RSA-2048 Autor Luongo, Alessandro, Narasimhachar, Varun, Sireesh, Adithya

    Vydáno: IEEE 22.06.2025
    “…Windowed arithmetic is a technique for reducing the cost of quantum arithmetic circuits with space-time trade-offs using memory queries to precomputed tables…”
    Získat plný text
    Konferenční příspěvek
  3. 3

    Optimized Polynomial Multiplier Architectures for Post-Quantum KEM Saber Autor Basso, Andrea, Roy, Sujoy Sinha

    Vydáno: IEEE 05.12.2021
    “…Saber is one of the four finalists in the ongoing NIST post-quantum cryptography standardization project. A significant portion of Saber's computation time is…”
    Získat plný text
    Konferenční příspěvek
  4. 4

    zkVC: Fast Zero-Knowledge Proof for Private and Verifiable Computing Autor Zhang, Yancheng, Zheng, Mengxin, Chen, Xun, Hu, Jingtong, Shi, Weidong, Ju, Lei, Solihin, Yan, Lou, Qian

    Vydáno: IEEE 22.06.2025
    “…In the context of cloud computing, services are held on cloud servers, where the clients send their data to the server and obtain the results returned by…”
    Získat plný text
    Konferenční příspěvek
  5. 5

    ZK-Hammer: Leaking Secrets from Zero-Knowledge Proofs via Rowhammer Autor Liang, Junkai, Zhang, Xin, Hu, Daqi, Shen, Qingni, Fang, Yuejian, Wu, Zhonghai

    Vydáno: IEEE 22.06.2025
    “…Zero-knowledge succinct non-interactive arguments of knowledge (zk-SNARK) schemes have been a promising technique in verified computation. Zk-SNARK schemes…”
    Získat plný text
    Konferenční příspěvek
  6. 6

    ALLMod: Exploring Area-Efficiency of LUT-based Large Number Modular Reduction via Hybrid Workloads Autor Liu, Fangxin, Li, Haomin, Wang, Zongwu, Zhang, Bo, Zhang, Mingzhe, Yan, Shoumeng, Jiang, Li, Guan, Haibing

    Vydáno: IEEE 22.06.2025
    “…Modular arithmetic, particularly modular reduction, is widely used in cryptographic applications such as homomorphic encryption (HE) and zero-knowledge proofs…”
    Získat plný text
    Konferenční příspěvek
  7. 7

    Lightning Talk: The Incredible Shrinking Black Box Model Autor Schaumont, Patrick

    Vydáno: IEEE 09.07.2023
    “…A black box model is an assumption on the implementation of a cryptographic primitive to limit the capabilities of the attacker. Black boxes are a useful…”
    Získat plný text
    Konferenční příspěvek
  8. 8

    Invited: Accelerating Fully Homomorphic Encryption with Processing in Memory Autor Gupta, Saransh, Rosing, Tajana Simunic

    Vydáno: IEEE 05.12.2021
    “…Fully homomorphic encryption (FHE) provides a promising solution for future computing needs by allowing privacy-preserving computation. However, its practical…”
    Získat plný text
    Konferenční příspěvek
  9. 9

    NECTAR: non-interactive smart contract protocol using blockchain technology Autor Covaci, Alexandra, Madeo, Simone, Motylinski, Patrick, Vincent, Stéphane

    ISBN: 9781450357265, 1450357261
    Vydáno: New York, NY, USA ACM 27.05.2018
    “…Blockchain-driven technologies are considered disruptive because of the availability of dis-intermediated, censorship-resistant and tamper-proof digital…”
    Získat plný text
    Konferenční příspěvek
  10. 10

    Decentralized Electronic Health Records Management via Redactable Blockchain and Revocable IPFS Autor Guo, Hao, Li, Wanxin, Meese, Collin, Nejad, Mark

    ISSN: 2832-2975
    Vydáno: IEEE 19.06.2024
    “…The increasing integration of the Internet of Health Things (IoHT) in the eHealth sector has significantly advanced the collection of Electronic Health Records…”
    Získat plný text
    Konferenční příspěvek
  11. 11

    Evaluating the Integration of Aurora Zksnark in the Zupply Framework Autor Badakhshan, Mohammadtaghi, Gong, Guang

    Vydáno: IEEE 03.05.2025
    “…The Zupply framework introduces an anonymous authentication protocol that utilizes zero-knowledge proofs to ensure data integrity, participant anonymity, and…”
    Získat plný text
    Konferenční příspěvek