Search Results - "Drucker, Nir"
-
1
Selfie: reflections on TLS 1.3 with PSK
Published in Journal of cryptology (01-07-2021)“…TLS 1.3 allows two parties to establish a shared session key from an out-of-band agreed pre-shared key (PSK). The PSK is used to mutually authenticate the…”
Get full text
Journal Article -
2
BLEACH: Cleaning Errors in Discrete Computations Over CKKS
Published in Journal of cryptology (2024)“…Approximated homomorphic encryption (HE) schemes such as CKKS are commonly used to perform computations over encrypted real numbers. It is commonly assumed…”
Get full text
Journal Article -
3
A toolbox for software optimization of QC-MDPC code-based cryptosystems
Published in Journal of cryptographic engineering (01-11-2019)“…The anticipated emergence of quantum computers in the foreseeable future drives the cryptographic community to start considering cryptosystems, which are based…”
Get full text
Journal Article -
4
Fast polynomial inversion for post quantum QC-MDPC cryptography
Published in Information and computation (01-12-2021)“…New post-quantum Key Encapsulation Mechanism (KEM) designs, evaluated as part of the NIST PQC standardization Project, pose challenging tradeoffs between…”
Get full text
Journal Article -
5
Speeding-Up P-256 ECDSA Verification on x86-64 Servers
Published in IEEE letters of the Computer Society (01-06-2019)“…ECDSA is a frequently used signature scheme that has attracted a great deal of software and hardware optimization efforts. In particular, the NIST P-256 curve…”
Get full text
Journal Article -
6
Efficient Skip Connections Realization for Secure Inference on Encrypted Data
Published 11-06-2023“…Homomorphic Encryption (HE) is a cryptographic tool that allows performing computation under encryption, which is used by many privacy-preserving machine…”
Get full text
Journal Article -
7
Accelerating Cryptographic Algorithms Using Advanced and Future Architectures
Published 01-01-2019“…Cryptographic techniques can provide data confidentiality, privacy, anonymity, integrity and other properties that are needed for information security…”
Get full text
Dissertation -
8
Fast constant time implementations of ZUC-256 on x86 CPUs
Published in 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC) (01-01-2019)“…ZUC-256 is a Pseudo Random Number Generator (PRNG) that is proposed as a successor of ZUC-128. Similarly to ZUC-128 that is incorporated in the 128-EEA3 and…”
Get full text
Conference Proceeding -
9
Generating One-Hot Maps under Encryption
Published 11-06-2023“…One-hot maps are commonly used in the AI domain. Unsurprisingly, they can also bring great benefits to ML-based algorithms such as decision trees that run…”
Get full text
Journal Article -
10
Cryptosystems with a multi prime composite modulus
Published in 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC) (01-01-2018)“…Multi-Prime (MP)RSA is an RSA construction in which the public modulus is a product of more than two primes, and its private key operations can be accelerated…”
Get full text
Conference Proceeding -
11
Paillier-encrypted databases with fast aggregated queries
Published in 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC) (01-01-2017)“…The proliferating usage of cloud environments to store databases poses new challenges. Traditional encryption protects the user's data privacy, but prevents…”
Get full text
Conference Proceeding -
12
A methodology for training homomorphicencryption friendly neural networks
Published 07-07-2022“…Privacy-preserving deep neural network (DNN) inference is a necessity in different regulated industries such as healthcare, finance and retail. Recently,…”
Get full text
Journal Article -
13
Power-Softmax: Towards Secure LLM Inference over Encrypted Data
Published 12-10-2024“…Modern cryptographic methods for implementing privacy-preserving LLMs such as Homomorphic Encryption (HE) require the LLMs to have a polynomial form. Forming…”
Get full text
Journal Article -
14
Converting Transformers to Polynomial Form for Secure Inference Over Homomorphic Encryption
Published 14-11-2023“…Designing privacy-preserving deep learning models is a major challenge within the deep learning community. Homomorphic Encryption (HE) has emerged as one of…”
Get full text
Journal Article -
15
Training Large Scale Polynomial CNNs for E2E Inference over Homomorphic Encryption
Published 26-04-2023“…Training large-scale CNNs that during inference can be run under Homomorphic Encryption (HE) is challenging due to the need to use only polynomial operations…”
Get full text
Journal Article -
16
Efficient Pruning for Machine Learning Under Homomorphic Encryption
Published 04-11-2024“…In: Tsudik, G., Conti, M., Liang, K., Smaragdakis, G. (eds) Computer Security - ESORICS 2023. ESORICS 2023. Lecture Notes in Computer Science, vol 14347…”
Get full text
Journal Article -
17
Fast multiplication of binary polynomials with the forthcoming vectorized VPCLMULQDQ instruction
Published in 2018 IEEE 25th Symposium on Computer Arithmetic (ARITH) (01-06-2018)“…Polynomial multiplication over binary fields \mathbb{F}_{2^{n}} is a common primitive, used for example by current cryptosystems such as AES-GCM (with n=128) …”
Get full text
Conference Proceeding -
18
The Comeback of Reed Solomon Codes
Published in 2018 IEEE 25th Symposium on Computer Arithmetic (ARITH) (01-06-2018)“…Distributed storage systems utilize erasure codes to reduce their storage costs while efficiently handling failures. Many of these codes (e. g., Reed-Solomon…”
Get full text
Conference Proceeding -
19
Privacy-preserving record linkage using local sensitive hash and private set intersection
Published 27-03-2022“…The amount of data stored in data repositories increases every year. This makes it challenging to link records between different datasets across companies and…”
Get full text
Journal Article -
20
HeLayers: A Tile Tensors Framework for Large Neural Networks on Encrypted Data
Published 01-01-2023“…Privacy-preserving solutions enable companies to offload confidential data to third-party services while fulfilling their government regulations. To accomplish…”
Get full text
Journal Article