Zobrazeno 1 - 10
of 17
pro vyhledávání: '"Hilder V. L. Pereira"'
Autor:
Robin Geelen, Michiel Van Beirendonck, Hilder V. L. Pereira, Brian Huffman, Tynan McAuley, Ben Selfridge, Daniel Wagner, Georgios Dimou, Ingrid Verbauwhede, Frederik Vercauteren, David W. Archer
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2023, Iss 4 (2023)
Fully Homomorphic Encryption (FHE) allows for secure computation on encrypted data. Unfortunately, huge memory size, computational cost and bandwidth requirements limit its practicality. We present BASALISC, an architecture family of hardware acceler
Externí odkaz:
https://doaj.org/article/ad97ff20864c4b7e9cceb6b4776a828c
Publikováno v:
Proceedings on Privacy Enhancing Technologies. 2022:670-683
We propose homomorphic algorithms for privacy-preserving applications where we are given an encrypted dataset and we want to compute the number of elements that share a common property. We consider a two party scenario between a client and a server,
Autor:
Hilder V. L. Pereira
Publikováno v:
Applied Cryptography and Network Security ISBN: 9783030578077
ACNS (1)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Applied Cryptography and Network Security
ACNS (1)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Applied Cryptography and Network Security
We propose a leveled homomorphic encryption scheme based on the Approximate Greatest Common Divisor (AGCD) problem that operates natively on vectors and matrices. To overcome the limitation of large ciphertext expansion that is typical in AGCD-based
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2cedf0a42163c2ae97def24b79010de1
https://doi.org/10.1007/978-3-030-57808-4_6
https://doi.org/10.1007/978-3-030-57808-4_6
Publikováno v:
Advances in Cryptology – ASIACRYPT 2019-25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part II
Lecture Notes in Computer Science ISBN: 9783030346201
ASIACRYPT (2)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – ASIACRYPT 2019
Lecture Notes in Computer Science ISBN: 9783030346201
ASIACRYPT (2)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – ASIACRYPT 2019
Indistinguishability obfuscation constructions based on matrix branching programs generally proceed in two steps: first apply Kilian’s randomization of the matrix product computation, and then encode the matrices using a multilinear map scheme. In
Autor:
Hilder V. L. Pereira, Diego F. Aranha
Publikováno v:
Anais do XVI Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg 2016).
Tarefas de aprendizagem de máquina normalmente exigem que grandes quantidades de dados sensíveis sejam compartilhados, o que é notoriamente intrusivo em termos de privacidade. Terceirizar esta computação para a nuvem requer que o servidor seja c
Autor:
Marc Joye, Gregor Leander
The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024, held in in Zurich, Switzerland, in May 2024. The
Autor:
Marc Joye, Gregor Leander
The 7-volume set LNCS 14651 - 14657 conference volume constitutes the proceedings of the 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2024, held in in Zurich, Switzerland, in May 2024. The
Autor:
Tianqing Zhu, Yannan Li
This volume constitutes the refereed proceedings of the 29th Australasian Conference, ACISP 2024, held in Sydney, NSW, Australia, during July 15–17, 2024. The 70 full papers were carefully reviewed and selected from 232 submission. They are categor
Autor:
Shweta Agrawal, Dongdai Lin
The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during Decem
Autor:
Jian Guo, Ron Steinfeld
The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023.The