{ABY2. 0}: Improved {Mixed-Protocol} secure {Two-Party} computation

A Patra, T Schneider, A Suresh, H Yalame - 30th USENIX Security …, 2021 - usenix.org
Secure Multi-party Computation (MPC) allows a set of mutually distrusting parties to jointly
evaluate a function on their private inputs while maintaining input privacy. In this work, we …

A survey paper on design and implementation of multipliers for digital system applications

S Immareddy, A Sundaramoorthy - Artificial Intelligence Review, 2022 - Springer
Multiplication is one of the essential functions in all digital systems. The evaluation of digital
system, have brought out new challenges in VLSI (Very Large Scale Integration) designing …

MP2ML: A mixed-protocol machine learning framework for private inference

F Boemer, R Cammarota, D Demmler… - Proceedings of the 15th …, 2020 - dl.acm.org
Privacy-preserving machine learning (PPML) has many applications, from medical image
classification and anomaly detection to financial analysis. nGraph-HE enables data …

[PDF][PDF] FLGUARD: Secure and Private Federated Learning.

TD Nguyen, P Rieger, H Yalame… - IACR Cryptol. ePrint …, 2021 - iacr.steepath.eu
Recently, a number of backdoor attacks against Federated Learning (FL) have been
proposed. In such attacks, an adversary injects poisoned model updates into the federated …

FLUTE: fast and secure lookup table evaluations

A Brüggemann, R Hundt, T Schneider… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
The concept of using Lookup Tables (LUTs) instead of Boolean circuits is well-known and
been widely applied in a variety of applications, including FPGAs, image processing, and …

Approximate multipliers using static segmentation: Error analysis and improvements

AGM Strollo, E Napoli, D De Caro… - … on Circuits and …, 2022 - ieeexplore.ieee.org
Approximate multipliers are used in error-tolerant applications, sacrificing the accuracy of
results to minimize power or delay. In this paper we investigate approximate multipliers …

SynCirc: efficient synthesis of depth-optimized circuits for secure computation

A Patra, T Schneider, A Suresh… - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Secure Multi-party Computation (MPC) allows to securely compute on private data. To make
MPC practical, logic synthesis can be used to automatically translate a description of the …

Llvm-based circuit compilation for practical secure computation

T Heldmann, T Schneider, O Tkachenko… - … Conference on Applied …, 2021 - Springer
Multi-party computation (MPC) allows two or more parties to jointly and securely compute
functions over private inputs. Cryptographic protocols that realize MPC require functions to …

FLUTE: Fast and Secure Lookup Table Evaluations (Full Version)

A Brüggemann, R Hundt, T Schneider… - Cryptology ePrint …, 2023 - eprint.iacr.org
The concept of using Lookup Tables (LUTs) instead of Boolean circuits is well-known and
been widely applied in a variety of applications, including FPGAs, image processing, and …

Energy efficient multiply-accumulate unit using novel recursive multiplication for error-tolerant applications

T Karthikeyan, NM Sk - Integration, 2023 - Elsevier
The primary requirement for multimedia applications is energy efficient design along with
computational efficiency of portable devices. This work proposes an energy efficient MAC …