Fast ORAM with Server-Aided Preprocessing and Pragmatic Privacy-Efficiency Trade-Off

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International Symposium on Cyber Security, Cryptology and Machine Learning (7. : 2023 : Beer Sheva) Cyber security, cryptology, and machine learning
1. Verfasser: Kolesnikov, Vladimir (VerfasserIn)
Weitere Verfasser: Peceny, Stanislav (VerfasserIn), Trieu, Ni (VerfasserIn), Wang, Xiao (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2023
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
A Fusion-Based Framework for Unsupervised Single Image Super-Resolution 2023 Mishra, Divya
Generating One-Hot Maps Under Encryption 2023 Aharoni, Ehud
A Bag of Tokens Neural Network to Predict Webpage Age 2023 Meinke, Klaas
HAMLET: A Transformer Based Approach for Money Laundering Detection 2023 Tatulli, Maria Paola
Enhancing Ransomware Classification with Multi-stage Feature Selection and Data Imbalance Correction 2023 Onwuegbuche, Faithful Chiagoziem
A Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural Networks 2023 Breier, Jakub
SigML: Supervised Log Anomaly with Fully Homomorphic Encryption 2023 Trivedi, Devharsh
Fast ORAM with Server-Aided Preprocessing and Pragmatic Privacy-Efficiency Trade-Off 2023 Kolesnikov, Vladimir
On the Existence of Highly Organized Communities in Networks of Locally Interacting Agents 2023 Liagkou, Vasiliki
Pseudo-random Walk on Ideals: Practical Speed-Up in Relation Collection for Class Group Computation 2023 Mukhopadhyay, Madhurima
Localhost Detour from Public to Private Networks 2023 Afek, Yehuda
On Distributed Randomness Generation in Blockchains 2023 Komargodski, Ilan
CANdito: Improving Payload-Based Detection of Attacks on Controller Area Networks 2023 Longari, Stefano
The Use of Performance-Countersto Perform Side-Channel Attacks 2023 Segev, Ron
Hollow-Pass: A Dual-View Pattern Password Against Shoulder-Surfing Attacks 2023 Tan, Jiayi
Practical Improvements on BKZ Algorithm 2023 Zhao, Ziyu
How Hardened is Your Hardware? Guiding ChatGPT to Generate Secure Hardware Resistant to CWEs 2023 Nair, Madhav
Evaluating the Robustness of Automotive Intrusion Detection Systems Against Evasion Attacks 2023 Longari, Stefano
A New Interpretation for the GHASH Authenticator of AES-GCM 2023 Gueron, Shay
Deep Neural Networks for Encrypted Inference with TFHE 2023 Stoian, Andrei
Alle Artikel auflisten