Zobrazeno 1 - 10
of 15
pro vyhledávání: '"David Bruce Cousins"'
Autor:
Ahmad Al Badawi, Jack Bates, Flavio Bergamaschi, David Bruce Cousins, Saroja Erabelli, Nicholas Genise, Shai Halevi, Hamish Hunt, Andrey Kim, Yongwoo Lee, Zeyu Liu, Daniele Micciancio, Ian Quah, Yuriy Polyakov, Saraswathy R.V., Kurt Rohloff, Jonathan Saylor, Dmitriy Suponitsky, Matthew Triplett, Vinod Vaikuntanathan, Vincent Zucca
Publikováno v:
Proceedings of the 10th Workshop on Encrypted Computing & Applied Homomorphic Cryptography.
Autor:
Giovanni Di Crescenzo, David Bruce Cousins, Yuriy Polyakov, Lisa Bahler, Brian A. Coan, Kurt Rohloff
Publikováno v:
Data and Applications Security and Privacy XXXV ISBN: 9783030812416
DBSec
DBSec
We consider the problem of protecting image classifiers simultaneously from inspection attacks (i.e., attacks that have read access to all details in the program’s code) and black-box attacks (i.e., attacks where have input/output access to the pro
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0a4db1512a609879799f8db60f43906c
https://doi.org/10.1007/978-3-030-81242-3_8
https://doi.org/10.1007/978-3-030-81242-3_8
Autor:
Kurt Rohloff, Yuriy Polyakov, David Bruce Cousins, Giovanni Di Crescenzo, Lisa Bahler, Brian A. Coan
Publikováno v:
CCSW@CCS
Machine Learning as a Service (aka MLaaS) and Smart Grid as a Service (aka SGaaS) are expected to grow at a significant rate. Just like most cloud services, MLaaS and SGaaS can be subject to a number of attacks. In this paper, we focus on white-box a
Publikováno v:
IEEE Transactions on Emerging Topics in Computing. 5:193-206
In this paper we report on our advances designing and implementing an FPGA-based computation accelerator as part of a Homomorphic Encryption Processing Unit (HEPU) co-processor. This hardware accelerator technology improves the practicality of comput
Autor:
Gerard Ryan, Yuriy Polyakov, Kamil Doruk Gür, Giovanni Di Crescenzo, Kevin R. King, Erkay Savas, David Bruce Cousins, Kurt Rohloff
Publikováno v:
IEEE Symposium on Security and Privacy
We address the practicality challenges of secure program obfuscation by implementing, optimizing, and experimentally assessing an approach to securely obfuscate conjunction programs proposed in [1]. Conjunction programs evaluate functions $f (x_1, .
Autor:
Brian A. Coan, David Bruce Cousins, Kurt Rohloff, Yuriy Polyakov, Lisa Bahler, Giovanni Di Crescenzo
Publikováno v:
HPCS
Point function obfuscators have recently been shown to be the first examples of program obfuscators provable under hardness assumptions commonly used in cryptography. This is remarkable, in light of early results in this area, showing impossibility o
Publikováno v:
HPEC
One of the goals of the DARPA PROCEED pro-gram has been accelerating the development of a practical Fully Homomorphic Encryption (FHE) scheme. For the past three years, this program has succeeded in accelerating various aspects of the FHE concept tow
Autor:
Kurt Rohloff, David Bruce Cousins
Publikováno v:
Financial Cryptography and Data Security ISBN: 9783662447734
Financial Cryptography Workshops
Financial Cryptography Workshops
In this paper we report on our work to design, implement and evaluate a Fully Homomorphic Encryption (FHE) scheme. Our FHE scheme is an NTRU-like cryptosystem, with additional support for efficient key switching and modulus reduction operations to re
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8f033b5b912786df4612a71b1c5414cd
https://doi.org/10.1007/978-3-662-44774-1_18
https://doi.org/10.1007/978-3-662-44774-1_18
Publikováno v:
HPEC
Accelerating the development of a practical Fully Homomorphic Encryption (FHE) scheme is the goal of the DARPA PROCEED program. For the past year, this program has had as its focus the acceleration of various aspects of the FHE concept toward practic
Autor:
Doyle Weishar, Richard Rohwer, Michael John Nicoletti, J. Brian Sharkey, John Byrnes, R. Loui, Stephen G. Eick, David Bruce Cousins, Krishna R. Pattipati, John W. Lockwood
Publikováno v:
Emergent Information Technologies and Enabling Policies for Counter-Terrorism
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4f6fcb4f1cb3659c2c388eeaf76aa057
https://doi.org/10.1002/047178656x.ch4
https://doi.org/10.1002/047178656x.ch4