Search Results - "Drucker, Nir"

Refine Results
  1. 1

    Selfie: reflections on TLS 1.3 with PSK by Drucker, Nir, Gueron, Shay

    Published in Journal of cryptology (01-07-2021)
    “…TLS 1.3 allows two parties to establish a shared session key from an out-of-band agreed pre-shared key (PSK). The PSK is used to mutually authenticate the…”
    Get full text
    Journal Article
  2. 2

    BLEACH: Cleaning Errors in Discrete Computations Over CKKS by Drucker, Nir, Moshkowich, Guy, Pelleg, Tomer, Shaul, Hayim

    Published in Journal of cryptology (2024)
    “…Approximated homomorphic encryption (HE) schemes such as CKKS are commonly used to perform computations over encrypted real numbers. It is commonly assumed…”
    Get full text
    Journal Article
  3. 3

    A toolbox for software optimization of QC-MDPC code-based cryptosystems by Drucker, Nir, Gueron, Shay

    Published in Journal of cryptographic engineering (01-11-2019)
    “…The anticipated emergence of quantum computers in the foreseeable future drives the cryptographic community to start considering cryptosystems, which are based…”
    Get full text
    Journal Article
  4. 4

    Fast polynomial inversion for post quantum QC-MDPC cryptography by Drucker, Nir, Gueron, Shay, Kostic, Dusan

    Published in Information and computation (01-12-2021)
    “…New post-quantum Key Encapsulation Mechanism (KEM) designs, evaluated as part of the NIST PQC standardization Project, pose challenging tradeoffs between…”
    Get full text
    Journal Article
  5. 5

    Speeding-Up P-256 ECDSA Verification on x86-64 Servers by Drucker, Nir, Gueron, Shay

    Published in IEEE letters of the Computer Society (01-06-2019)
    “…ECDSA is a frequently used signature scheme that has attracted a great deal of software and hardware optimization efforts. In particular, the NIST P-256 curve…”
    Get full text
    Journal Article
  6. 6

    Efficient Skip Connections Realization for Secure Inference on Encrypted Data by Drucker, Nir, Zimerman, Itamar

    Published 11-06-2023
    “…Homomorphic Encryption (HE) is a cryptographic tool that allows performing computation under encryption, which is used by many privacy-preserving machine…”
    Get full text
    Journal Article
  7. 7

    Accelerating Cryptographic Algorithms Using Advanced and Future Architectures by Drucker, Nir, דרוקר, ניר

    Published 01-01-2019
    “…Cryptographic techniques can provide data confidentiality, privacy, anonymity, integrity and other properties that are needed for information security…”
    Get full text
    Dissertation
  8. 8

    Fast constant time implementations of ZUC-256 on x86 CPUs by Drucker, Nir, Gueron, Shay

    “…ZUC-256 is a Pseudo Random Number Generator (PRNG) that is proposed as a successor of ZUC-128. Similarly to ZUC-128 that is incorporated in the 128-EEA3 and…”
    Get full text
    Conference Proceeding
  9. 9

    Generating One-Hot Maps under Encryption by Aharoni, Ehud, Drucker, Nir, Kushnir, Eyal, Masalha, Ramy, Shaul, Hayim

    Published 11-06-2023
    “…One-hot maps are commonly used in the AI domain. Unsurprisingly, they can also bring great benefits to ML-based algorithms such as decision trees that run…”
    Get full text
    Journal Article
  10. 10

    Cryptosystems with a multi prime composite modulus by Drucker, Nir, Gueron, Shay

    “…Multi-Prime (MP)RSA is an RSA construction in which the public modulus is a product of more than two primes, and its private key operations can be accelerated…”
    Get full text
    Conference Proceeding
  11. 11

    Paillier-encrypted databases with fast aggregated queries by Drucker, Nir, Gueron, Shay

    “…The proliferating usage of cloud environments to store databases poses new challenges. Traditional encryption protects the user's data privacy, but prevents…”
    Get full text
    Conference Proceeding
  12. 12

    A methodology for training homomorphicencryption friendly neural networks by Baruch, Moran, Drucker, Nir, Greenberg, Lev, Moshkowich, Guy

    Published 07-07-2022
    “…Privacy-preserving deep neural network (DNN) inference is a necessity in different regulated industries such as healthcare, finance and retail. Recently,…”
    Get full text
    Journal Article
  13. 13

    Power-Softmax: Towards Secure LLM Inference over Encrypted Data by Zimerman, Itamar, Adir, Allon, Aharoni, Ehud, Avitan, Matan, Baruch, Moran, Drucker, Nir, Lerner, Jenny, Masalha, Ramy, Meiri, Reut, Soceanu, Omri

    Published 12-10-2024
    “…Modern cryptographic methods for implementing privacy-preserving LLMs such as Homomorphic Encryption (HE) require the LLMs to have a polynomial form. Forming…”
    Get full text
    Journal Article
  14. 14

    Converting Transformers to Polynomial Form for Secure Inference Over Homomorphic Encryption by Zimerman, Itamar, Baruch, Moran, Drucker, Nir, Ezov, Gilad, Soceanu, Omri, Wolf, Lior

    Published 14-11-2023
    “…Designing privacy-preserving deep learning models is a major challenge within the deep learning community. Homomorphic Encryption (HE) has emerged as one of…”
    Get full text
    Journal Article
  15. 15

    Training Large Scale Polynomial CNNs for E2E Inference over Homomorphic Encryption by Baruch, Moran, Drucker, Nir, Ezov, Gilad, Goldberg, Yoav, Kushnir, Eyal, Lerner, Jenny, Soceanu, Omri, Zimerman, Itamar

    Published 26-04-2023
    “…Training large-scale CNNs that during inference can be run under Homomorphic Encryption (HE) is challenging due to the need to use only polynomial operations…”
    Get full text
    Journal Article
  16. 16

    Efficient Pruning for Machine Learning Under Homomorphic Encryption by Aharoni, Ehud, Baruch, Moran, Bose, Pradip, Buyuktosunoglu, Alper, Drucker, Nir, Pal, Subhankar, Pelleg, Tomer, Sarpatwar, Kanthi, Shaul, Hayim, Soceanu, Omri, Vaculin, Roman

    Published 04-11-2024
    “…In: Tsudik, G., Conti, M., Liang, K., Smaragdakis, G. (eds) Computer Security - ESORICS 2023. ESORICS 2023. Lecture Notes in Computer Science, vol 14347…”
    Get full text
    Journal Article
  17. 17

    Fast multiplication of binary polynomials with the forthcoming vectorized VPCLMULQDQ instruction by Drucker, Nir, Gueron, Shay, Krasnov, Vlad

    “…Polynomial multiplication over binary fields \mathbb{F}_{2^{n}} is a common primitive, used for example by current cryptosystems such as AES-GCM (with n=128) …”
    Get full text
    Conference Proceeding
  18. 18

    The Comeback of Reed Solomon Codes by Drucker, Nir, Gueron, Shay, Krasnov, Vlad

    “…Distributed storage systems utilize erasure codes to reduce their storage costs while efficiently handling failures. Many of these codes (e. g., Reed-Solomon…”
    Get full text
    Conference Proceeding
  19. 19

    Privacy-preserving record linkage using local sensitive hash and private set intersection by Adir, Allon, Aharoni, Ehud, Drucker, Nir, Kushnir, Eyal, Masalha, Ramy, Mirkin, Michael, Soceanu, Omri

    Published 27-03-2022
    “…The amount of data stored in data repositories increases every year. This makes it challenging to link records between different datasets across companies and…”
    Get full text
    Journal Article
  20. 20

    HeLayers: A Tile Tensors Framework for Large Neural Networks on Encrypted Data by Aharoni, Ehud, Adir, Allon, Baruch, Moran, Drucker, Nir, Ezov, Gilad, Farkash, Ariel, Greenberg, Lev, Masalha, Ramy, Moshkowich, Guy, Murik, Dov, Shaul, Hayim, Soceanu, Omri

    Published 01-01-2023
    “…Privacy-preserving solutions enable companies to offload confidential data to third-party services while fulfilling their government regulations. To accomplish…”
    Get full text
    Journal Article