搜索结果: 1-15 共查到“compiler”相关记录20条 . 查询时间(0.046 秒)
Formal Verification of a Constant-Time Preserving C Compiler
Compilation Formal verification Constant-time security
font style='font-size:12px;'>
2019/8/19
Timing side-channels are arguably one of the main sources of vulnerabilities in cryptographic implementations. One effective mitigation against timing side-channels is to write programs that do not pe...
nGraph-HE: A Graph Compiler for Deep Learning on Homomorphically Encrypted Data
Homomorphic encryption intermediate representation deep learning
font style='font-size:12px;'>
2019/4/3
Homomorphic encryption (HE)---the ability to perform computation on encrypted data---is an attractive remedy to increasing concerns about data privacy in deep learning (DL). However, building DL model...
Generalizing the SPDZ Compiler For Other Protocols
cryptographic protocols secure multiparty computation
font style='font-size:12px;'>
2018/8/21
Protocols for secure multiparty computation (MPC) enable a set of mutually distrusting parties to compute an arbitrary function of their inputs while preserving basic security properties like \emph{pr...
Matrioska: A Compiler for Multi-Key Homomorphic Signatures
Multi-Key Homomorphic Signatures Compiler
font style='font-size:12px;'>
2018/6/25
Multi-Key Homomorphic Signatures (MKHS) enable clients in a system to sign and upload messages to an untrusted server. At any later point in time, the server can perform a computation CC on data provi...
CAMFAS: A Compiler Approach to Mitigate Fault Attacks via Enhanced SIMDization
Fault attack SIMD Vectorization
font style='font-size:12px;'>
2017/11/13
The trend of supporting wide vector units in general purpose microprocessors suggests opportunities for developing a new and elegant compilation approach to mitigate the impact of faults to cryptograp...
Yet Another Compiler for Active Security or: Efficient MPC Over Arbitrary Rings
MPC Blackbox Compiler
font style='font-size:12px;'>
2017/9/25
We present a very simple yet very powerful idea for turning any semi-honestly secure MPC protocol into an actively secure one, at the price of reducing the threshold of tolerated corruptions.
An Obfuscating Compiler
Code Obfuscation Privacy Computer Architecture
font style='font-size:12px;'>
2017/2/20
Privacy for arbitrary encrypted remote computation in the cloud depends on the running code on the server being obfuscated from the standpoint of the operator in the computer room. This paper shows fo...
A Unilateral-to-Mutual Authentication Compiler for Key Exchange (with Applications to Client Authentication in TLS 1.3)
TLS key exchange authentication
font style='font-size:12px;'>
2016/7/20
We study the question of how to build "compilers" that transform a unilaterally authenticated (UA) key-exchange protocol into a mutually-authenticated (MA) one. We present a simple and efficient compi...
Cool: A Portable Project for Teaching Compiler Construction
Cool Portable Project Teaching Compiler Construction
font style='font-size:12px;'>
2016/5/25
The compiler course is a xture of undergraduate computer science education. Most CS programs oer a course on compilers that includes a substantial pro ject where students write a compiler for a smal...
A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-wise Tampering and Permutations
Non-malleable Codes Explicit Construction Information Theoretic
font style='font-size:12px;'>
2016/1/6
A non-malleable code protects messages against a class of tampering functions. Informally,
a code is non-malleable if the effect of applying any tampering function on an encoded message
is to either...
Compositional Verification of Higher-Order Masking: Application to a Verifying Masking Compiler
Masking Composition Formal Methods
font style='font-size:12px;'>
2015/12/30
The prevailing approach for building masked algorithms that can resist
higher-order differential power analysis is to develop gadgets, that is, masked
gates used as atomic blocks, that securely impl...
A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer
game-theoretic security universal composability local universal composability
font style='font-size:12px;'>
2015/12/22
In this paper, we consider the following question: Does composing protocols having gametheoretic
security result in a secure protocol in the sense of game-theoretic security? In order
to discuss the...
A Compiler for Two-level Phonological Rules
Compiler Two-level Phonological
font style='font-size:12px;'>
2015/6/18
A Compiler for Two-level Phonological Rules.
VHDL “Digital Lock” design implemtntation on Altera DE2 board and Area and Time optimization of ASIC “FIFO” design using Synopsys design compiler
VHDL design of LCD display integrated circuit the design optimization tool
font style='font-size:12px;'>
2014/12/31
Part 1: In this the main objective of the project was to produce a VHDL design which can be programmed on Altera DE2 board. This project gives an overview of how different components of DE2 board can ...
Generalized Instruction Selector Generation: The Automatic Construction of Instruction Selectors from Descriptions of Compiler Internal Forms and Target Machines
Architecture Code Generation Compilers
font style='font-size:12px;'>
2014/12/18
One of the most difficult tasks a compiler writer faces is the construction of the instruction selector. The instruction selector is that part of the compiler that translates compiler intermediate rep...