Zobrazeno 1 - 10
of 26
pro vyhledávání: '"Dimitar Jetchev"'
Autor:
Kevin Deforth, Marc Desgroseilliers, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev, Marius Vuille
Publikováno v:
Proceedings on Privacy Enhancing Technologies. 2022:66-85
We present a novel protocol XORBoost for both training gradient boosted tree models and for using these models for inference in the multiparty computation (MPC) setting. Our protocol supports training for generically split datasets (vertical and hori
Publikováno v:
2022 IEEE 15th International Conference on Cloud Computing (CLOUD).
Autor:
Dimitar Jetchev, Alistair Muir
Publikováno v:
Protecting Privacy through Homomorphic Encryption ISBN: 9783030772864
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f806c61e6d011558cdb446ee1bf0d671
https://doi.org/10.1007/978-3-030-77287-1_4
https://doi.org/10.1007/978-3-030-77287-1_4
Publikováno v:
Journal of Mathematical Cryptology
Journal of Mathematical Cryptology, De Gruyter, 2020, 14 (1), pp.316-338. ⟨10.1515/jmc-2019-0026⟩
Journal of Mathematical Cryptology, Vol 14, Iss 1, Pp 316-338 (2020)
Journal of Mathematical Cryptology, 2020, 14 (1), pp.316-338. ⟨10.1515/jmc-2019-0026⟩
Journal of Mathematical Cryptology, De Gruyter, 2020, 14 (1), pp.316-338. ⟨10.1515/jmc-2019-0026⟩
Journal of Mathematical Cryptology, Vol 14, Iss 1, Pp 316-338 (2020)
Journal of Mathematical Cryptology, 2020, 14 (1), pp.316-338. ⟨10.1515/jmc-2019-0026⟩
This paper proposes a practical hybrid solution for combining and switching between three popular Ring-LWE-based FHE schemes: TFHE, B/FV and HEAAN. This is achieved by first mapping the different plaintext spaces to a common algebraic structure and t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b0a7db11f3bc2cec2d4ae3bac621bbdd
https://hal.archives-ouvertes.fr/hal-03228168/document
https://hal.archives-ouvertes.fr/hal-03228168/document
Autor:
George Todorov, Dimitar Jetchev
Publikováno v:
2019 16th Conference on Electrical Machines, Drives and Power Systems (ELMA).
The variable geometric dimensions of the magnetic circuit in the conical rotor induction motors in axial direction makes the magnetic flux non-uniform distribution in the length of the magnetic core. An analytical multisectional method for electromag
Publikováno v:
Cambridge Journal of Mathematics. 5:369-434
Let $E/\mathbb{Q}$ be a semistable elliptic curve such that $\mathrm{ord}_{s=1}L(E,s) = 1$. We prove the $p$-part of the Birch and Swinnerton-Dyer formula for $E/\mathbb{Q}$ for each prime $p \geq 5$ of good reduction such that $E[p]$ is irreducible:
Publikováno v:
Proceedings of the London Mathematical Society
We construct two-parameter analytic families of Galois cohomology classes interpolating the etale Abel--Jacobi images of generalised Heegner cycles, with both the modular form and Grossencharacter varying in p-adic families.
Comment: 23 pages. R
Comment: 23 pages. R
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ac8889176d3e879cd31a4645a5ef243f
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030209506
CSCML
CSCML
Convolutional neural networks (CNNs) is a category of deep neural networks that are primarily used for classifying image data. Yet, their continuous gain in popularity poses important privacy concerns for the potentially sensitive data that they proc
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a326c2e0952811b495238e38043bcc77
https://doi.org/10.1007/978-3-030-20951-3_20
https://doi.org/10.1007/978-3-030-20951-3_20
Autor:
Stanislav Peceny, Christina Boura, Ilaria Chillotti, Nicolas Gama, Alexander Petric, Dimitar Jetchev
Publikováno v:
In Proceedings of Financial Cryptography and Data Security-(FC) 2018
In Proceedings of Financial Cryptography and Data Security-(FC) 2018, 2018, Nieuwpoort, Curaçao. ⟨10.1007/978-3-662-58387-6_10⟩
Financial Cryptography and Data Security ISBN: 9783662583869
Financial Cryptography
In Proceedings of Financial Cryptography and Data Security-(FC) 2018, 2018, Nieuwpoort, Curaçao. ⟨10.1007/978-3-662-58387-6_10⟩
Financial Cryptography and Data Security ISBN: 9783662583869
Financial Cryptography
We propose a novel multi-party computation protocol for evaluating continuous real-valued functions with high numerical precision. Our method is based on approximations with Fourier series and uses at most two rounds of communication during the onlin
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::111864feb0b3e6e53c0ab073f76d6575
https://hal.uvsq.fr/hal-02171949
https://hal.uvsq.fr/hal-02171949
Publikováno v:
Journal of Mathematical Cryptology
Journal of Mathematical Cryptology, Vol 8, Iss 1, Pp 71-92 (2014)
Journal of Mathematical Cryptology, Vol 8, Iss 1, Pp 71-92 (2014)
We prove collision bounds for the Pollard rho algorithm to solve the discrete logarithm problem in a general cyclic group 𝐆 $\mathbf {G}$ . Unlike the setting studied by Kim et al., we consider additive walks: the setting used in practice to solve
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::40162e0bb17a59524c7ee669f8f372f9
http://doc.rero.ch/record/304952/files/jmc-2012-0032.pdf
http://doc.rero.ch/record/304952/files/jmc-2012-0032.pdf