Zobrazeno 1 - 10
of 21
pro vyhledávání: '"Shahverdi, Aria"'
Autor:
Chen, Mingliang, Shahverdi, Aria, Anderson, Sarah, Park, Se Yong, Zhang, Justin, Dachman-Soled, Dana, Lauter, Kristin, Wu, Min
We propose new tools for policy-makers to use when assessing and correcting fairness and bias in AI algorithms. The three tools are: - A new definition of fairness called "controlled fairness" with respect to choices of protected features and filters
Externí odkaz:
http://arxiv.org/abs/2007.04484
We demonstrate the feasibility of database reconstruction under a cache side-channel attack on SQLite. Specifically, we present a Flush+Reload attack on SQLite that obtains approximate (or "noisy") volumes of range queries made to a private database.
Externí odkaz:
http://arxiv.org/abs/2006.15007
Publikováno v:
Journal of Mathematical Cryptology, Vol 15, Iss 1, Pp 72-86 (2020)
We initiate the study of partial key exposure in Ring-LWE (RLWE)-based cryptosystems. Specifically, we (1) Introduce the search and decision Leaky R-LWE assumptions (Leaky R-SLWE, Leaky R-DLWE), to formalize the hardness of search/decision RLWE under
Externí odkaz:
https://doaj.org/article/49908486d3e640a0a8b89c975baac695
Publikováno v:
Journal of Mathematical Cryptology, Vol 15, Iss 1, Pp 87-110 (2020)
The leftover hash lemma (LHL) is used in the analysis of various lattice-based cryptosystems, such as the Regev and Dual-Regev encryption schemes as well as their leakage-resilient counterparts. The LHL does not hold in the ring setting, when the rin
Externí odkaz:
https://doaj.org/article/467baf174cdd4e4ab555c1f45904077f
Publikováno v:
In Information and Computation October 2019 268
Autor:
Shahverdi, Aria
A small amount of information leakage can undermine the security of a design that is otherwise considered secure. Many studies demonstrate how common leakages such as power consumption, electromagnetic emission, and the time required to perform certa
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b90ac8d541cfae7f26f06f97f1c831f0
Autor:
Shahverdi, Aria
Publikováno v:
Masters Theses (All Theses, All Years).
"Securing data transmission has always been a challenge. While many cryptographic algorithms are available to solve the problem, many applications have tough area constraints while requiring high-level security. Lightweight cryptography aims at achie
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Journal of Mathematical Cryptology; 2021, Vol. 15 Issue 1, p87-110, 24p
Publikováno v:
Journal of Mathematical Cryptology; 2021, Vol. 15 Issue 1, p72-86, 15p