[HTML][HTML] Achieving cybersecurity in blockchain-based systems: A survey

M Gimenez-Aguilar, JM De Fuentes… - Future Generation …, 2021 - Elsevier
With the increase in connectivity, the popularization of cloud services, and the rise of the
Internet of Things (IoT), decentralized approaches for trust management are gaining …

Hardware-accelerated platforms and infrastructures for network functions: A survey of enabling technologies and research studies

P Shantharama, AS Thyagaturu, M Reisslein - IEEE Access, 2020 - ieeexplore.ieee.org
In order to facilitate flexible network service virtualization and migration, network functions
(NFs) are increasingly executed by software modules as so-called “softwarized NFs” on …

Stochastic switching and analog-state programmable memristor and its utilization for homomorphic encryption hardware

WH Cheong, JH In, JB Jeon, G Kim, KM Kim - Nature Communications, 2024 - nature.com
Homomorphic encryption performs computations on encrypted data without decrypting,
thereby eliminating security issues during the data communication between clouds and …

Memfhe: End-to-end computing with fully homomorphic encryption in memory

S Gupta, R Cammarota, T Šimunić - ACM Transactions on Embedded …, 2024 - dl.acm.org
The increasing amount of data and the growing complexity of problems have resulted in an
ever-growing reliance on cloud computing. However, many applications, most notably in …

INSPIRE: in-s torage p rivate i nformation re trieval via protocol and architecture co-design

J Lin, L Liang, Z Qu, I Ahmad, L Liu, F Tu… - Proceedings of the 49th …, 2022 - dl.acm.org
Private Information Retrieval (PIR) plays a vital role in secure, database-centric applications.
However, existing PIR protocols explore a massive working space containing hundreds of …

Medha: Microcoded hardware accelerator for computing on encrypted data

AC Mert, S Kwon, Y Shin, D Yoo, Y Lee… - arXiv preprint arXiv …, 2022 - arxiv.org
Homomorphic encryption (HE) enables computation on encrypted data, and hence it has a
great potential in privacy-preserving outsourcing of computations to the cloud. Hardware …

A privacy-preserving framework using homomorphic encryption for smart metering systems

W Xu, J Sun, R Cardell-Oliver, A Mian, JB Hong - Sensors, 2023 - mdpi.com
Smart metering systems (SMSs) have been widely used by industrial users and residential
customers for purposes such as real-time tracking, outage notification, quality monitoring …

REED: Chiplet-based accelerator for fully homomorphic encryption

A Aikata, AC Mert, S Kwon, M Deryabin… - Cryptology ePrint …, 2023 - eprint.iacr.org
Abstract Fully Homomorphic Encryption (FHE) enables privacy-preserving computation and
has many applications. However, its practical implementation faces massive computation …

Privacy-preserving deep learning based on multiparty secure computation: A survey

Q Zhang, C Xin, H Wu - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
Deep learning (DL) has demonstrated superior success in various of applications, such as
image classification, speech recognition, and anomalous detection. The unprecedented …

Scalability Limitations of Processing-in-Memory using Real System Evaluations

G Jonatan, H Cho, H Son, X Wu, N Livesay… - Proceedings of the …, 2024 - dl.acm.org
Processing-in-memory (PIM), where the compute is moved closer to the memory or the data,
has been widely explored to accelerate emerging workloads. Recently, different PIM-based …