搜索结果: 1-15 共查到“军事学 Compiler”相关记录15条 . 查询时间(0.061 秒)
Formal Verification of a Constant-Time Preserving C Compiler
Compilation Formal verification Constant-time security
font style='font-size:12px;'>
2019/8/19
Timing side-channels are arguably one of the main sources of vulnerabilities in cryptographic implementations. One effective mitigation against timing side-channels is to write programs that do not pe...
nGraph-HE: A Graph Compiler for Deep Learning on Homomorphically Encrypted Data
Homomorphic encryption intermediate representation deep learning
font style='font-size:12px;'>
2019/4/3
Homomorphic encryption (HE)---the ability to perform computation on encrypted data---is an attractive remedy to increasing concerns about data privacy in deep learning (DL). However, building DL model...
Generalizing the SPDZ Compiler For Other Protocols
cryptographic protocols secure multiparty computation
font style='font-size:12px;'>
2018/8/21
Protocols for secure multiparty computation (MPC) enable a set of mutually distrusting parties to compute an arbitrary function of their inputs while preserving basic security properties like \emph{pr...
Matrioska: A Compiler for Multi-Key Homomorphic Signatures
Multi-Key Homomorphic Signatures Compiler
font style='font-size:12px;'>
2018/6/25
Multi-Key Homomorphic Signatures (MKHS) enable clients in a system to sign and upload messages to an untrusted server. At any later point in time, the server can perform a computation CC on data provi...
CAMFAS: A Compiler Approach to Mitigate Fault Attacks via Enhanced SIMDization
Fault attack SIMD Vectorization
font style='font-size:12px;'>
2017/11/13
The trend of supporting wide vector units in general purpose microprocessors suggests opportunities for developing a new and elegant compilation approach to mitigate the impact of faults to cryptograp...
Yet Another Compiler for Active Security or: Efficient MPC Over Arbitrary Rings
MPC Blackbox Compiler
font style='font-size:12px;'>
2017/9/25
We present a very simple yet very powerful idea for turning any semi-honestly secure MPC protocol into an actively secure one, at the price of reducing the threshold of tolerated corruptions.
An Obfuscating Compiler
Code Obfuscation Privacy Computer Architecture
font style='font-size:12px;'>
2017/2/20
Privacy for arbitrary encrypted remote computation in the cloud depends on the running code on the server being obfuscated from the standpoint of the operator in the computer room. This paper shows fo...
A Unilateral-to-Mutual Authentication Compiler for Key Exchange (with Applications to Client Authentication in TLS 1.3)
TLS key exchange authentication
font style='font-size:12px;'>
2016/7/20
We study the question of how to build "compilers" that transform a unilaterally authenticated (UA) key-exchange protocol into a mutually-authenticated (MA) one. We present a simple and efficient compi...
A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-wise Tampering and Permutations
Non-malleable Codes Explicit Construction Information Theoretic
font style='font-size:12px;'>
2016/1/6
A non-malleable code protects messages against a class of tampering functions. Informally,
a code is non-malleable if the effect of applying any tampering function on an encoded message
is to either...
Compositional Verification of Higher-Order Masking: Application to a Verifying Masking Compiler
Masking Composition Formal Methods
font style='font-size:12px;'>
2015/12/30
The prevailing approach for building masked algorithms that can resist
higher-order differential power analysis is to develop gadgets, that is, masked
gates used as atomic blocks, that securely impl...
A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer
game-theoretic security universal composability local universal composability
font style='font-size:12px;'>
2015/12/22
In this paper, we consider the following question: Does composing protocols having gametheoretic
security result in a secure protocol in the sense of game-theoretic security? In order
to discuss the...
The IPS Compiler: Optimizations, Variants and Concrete Efficiency
cryptographic protocols
font style='font-size:12px;'>
2012/3/26
In recent work, Ishai, Prabhakaran and Sahai (CRYPTO 2008) presented a new compiler (hereafter the IPS compiler) for constructing protocols that are secure in the presence of malicious adversaries wit...
A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on $\Sigma$-Protocols
implementation Zero-Knowledge Protocol Compiler Formal Verification
font style='font-size:12px;'>
2010/7/14
Zero-knowledge proofs of knowledge (ZK-PoK) are important building blocks for numerous cryptographic applications. Although ZK-PoK have very useful properties, their real world deployment is typically...
First Steps Toward a Cryptography-Aware Language and Compiler
Cryptography-Aware Language Compiler cryptography-aware domain-specific language
font style='font-size:12px;'>
2009/2/9
When developing secure, high-performance cryptographic software,
the programmer is presented with a wide range of problems. Not
only must they be conversant with pertinent scientic results, they mu...
Compiler Assisted Elliptic Curve Cryptography
Compiler Elliptic Curve Cryptography
font style='font-size:12px;'>
2008/9/16
Although cryptographic implementation tasks are often undertaken
by expert programmers, a plethora of performance and security
driven options, as well as more mundane software engineering issues, st...