Zobrazeno 1 - 10
of 97
pro vyhledávání: '"Diego F. Aranha"'
Autor:
Diego F. Aranha, Sebastian Berndt, Thomas Eisenbarth, Okan Seker, Akira Takahashi, Luca Wilke, Greg Zaverucha
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2021, Iss 4 (2021)
We study masking countermeasures for side-channel attacks against signature schemes constructed from the MPC-in-the-head paradigm, specifically when the MPC protocol uses preprocessing. This class of signature schemes includes Picnic, an alternate ca
Externí odkaz:
https://doaj.org/article/0f4bbf6b13aa4387979d86a1ca942ed6
Autor:
Leonardo B. Oliveira, Fernando Magno Quintão Pereira, Rafael Misoczki, Diego F. Aranha, Fábio Borges, Michele Nogueira, Michelle Wangham, Min Wu, Jie Liu
Publikováno v:
Journal of Internet Services and Applications, Vol 9, Iss 1, Pp 1-25 (2018)
Abstract Decades went by since Mark Weiser published his influential work on the computer of the 21st century. Over the years, some of the UbiComp features presented in that paper have been gradually adopted by industry players in the technology mark
Externí odkaz:
https://doaj.org/article/f955ca40831e43b88cfc9e8623f61558
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2021, Iss 2 (2021)
The FHEW cryptosystem introduced the idea that an arbitrary function can be evaluated within the bootstrap procedure as a table lookup. The faster bootstraps of TFHE strengthened this approach, which was later named Functional Bootstrap (Boura et al.
Externí odkaz:
https://doaj.org/article/d324c45374af482fbeb43927d710f323
Autor:
Karima Velasquez, David Perez Abreu, Marcio R. M. Assis, Carlos Senna, Diego F. Aranha, Luiz F. Bittencourt, Nuno Laranjeiro, Marilia Curado, Marco Vieira, Edmundo Monteiro, Edmundo Madeira
Publikováno v:
Journal of Internet Services and Applications, Vol 9, Iss 1, Pp 1-23 (2018)
Abstract Recent developments in telecommunications have allowed drawing new paradigms, including the Internet of Everything, to provide services by the interconnection of different physical devices enabling the exchange of data to enrich and automate
Externí odkaz:
https://doaj.org/article/b41f9332398f44a3b65baea650716f29
Autor:
Pedro G. M. R. Alves, Diego F. Aranha
Publikováno v:
Journal of Internet Services and Applications, Vol 9, Iss 1, Pp 1-18 (2018)
Abstract Cloud computing is a ubiquitous paradigm responsible for a fundamental change in the way distributed computing is performed. The possibility to outsource the installation, maintenance and scalability of servers, added to competitive prices,
Externí odkaz:
https://doaj.org/article/5cfa14e651484c0f96ea2ddb6fba6eb2
Publikováno v:
Journal of Internet Services and Applications, Vol 8, Iss 1, Pp 1-16 (2017)
Abstract Conceptually, tuple spaces are shared memory objects that provide operations to store and retrieve ordered sets of data, called tuples. Tuples stored in a tuple space are accessed by the contents of their fields, working as an associative me
Externí odkaz:
https://doaj.org/article/883b2827cc1740b8a53c4a44fe4d9a14
Publikováno v:
Entropy, Vol 23, Iss 9, p 1108 (2021)
Several works have characterized weak instances of the Ring-LWE problem by exploring vulnerabilities arising from the use of algebraic structures. Although these weak instances are not addressed by worst-case hardness theorems, enabling other ring in
Externí odkaz:
https://doaj.org/article/e631469c77cf4090a94553d1dd16b5a4
Publikováno v:
Guimaraes, A, Neumann, L, Andaló, F A, Aranha, D F & Borin, E 2022, Homomorphic evaluation of large look-up tables for inference on human genome data in the cloud . in Proceedings-2022 IEEE 34th International Symposium on Computer Architecture and High Performance Computing Workshops, SBAC-PADW 2022 . IEEE, pp. 33-38, 2022 International Symposium on Computer Architecture and High Performance Computing Workshops (SBAC-PADW), Bordeaux, France, 02/11/2022 . https://doi.org/10.1109/SBAC-PADW56527.2022.00015
iDash is an annual competition for creating new solutions to tackle the challenges of securing human genome processing in untrusted environments, such as the public cloud. In this work, we propose and analyze a simple but efficient candidate for the
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1c73a27c6ec18f5303b62d48c7d22453
https://pure.au.dk/portal/da/publications/homomorphic-evaluation-of-large-lookup-tables-for-inference-on-human-genome-data-in-the-cloud(e3bc724a-7c84-46d5-addc-ff58116427b9).html
https://pure.au.dk/portal/da/publications/homomorphic-evaluation-of-large-lookup-tables-for-inference-on-human-genome-data-in-the-cloud(e3bc724a-7c84-46d5-addc-ff58116427b9).html
Publikováno v:
Aranha, D F, Lin, C, Orlandi, C & Simkin, M 2022, Laconic Private Set-Intersection From Pairings . in CCS '22 : Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security . Association for Computing Machinery, pp. 111-124, CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security, CA, Los Angeles, United States, 07/11/2022 . https://doi.org/10.1145/3548606.3560642
Private set-intersection (PSI) is one of the most practically relevant special-purpose secure multiparty computation tasks, as it is motivated by many real-world applications. In this paper we present a new private set-intersection protocol which is
Publikováno v:
Davi Resende, A C & Aranha, D F 2021, ' Faster unbalanced Private Set Intersection in the semi-honest setting ', Journal of Cryptographic Engineering, vol. 11, no. 1, pp. 21-38 . https://doi.org/10.1007/s13389-020-00242-7
Protocols for Private Set Intersection (PSI) are important cryptographic techniques to perform joint operations on datasets in a privacy-preserving way. They allow two parties to compute the intersection of their private sets without revealing any ad