{ABY2. 0}: Improved {Mixed-Protocol} secure {Two-Party} computation
Secure Multi-party Computation (MPC) allows a set of mutually distrusting parties to jointly
evaluate a function on their private inputs while maintaining input privacy. In this work, we …
evaluate a function on their private inputs while maintaining input privacy. In this work, we …
A survey paper on design and implementation of multipliers for digital system applications
S Immareddy, A Sundaramoorthy - Artificial Intelligence Review, 2022 - Springer
Multiplication is one of the essential functions in all digital systems. The evaluation of digital
system, have brought out new challenges in VLSI (Very Large Scale Integration) designing …
system, have brought out new challenges in VLSI (Very Large Scale Integration) designing …
MP2ML: A mixed-protocol machine learning framework for private inference
Privacy-preserving machine learning (PPML) has many applications, from medical image
classification and anomaly detection to financial analysis. nGraph-HE enables data …
classification and anomaly detection to financial analysis. nGraph-HE enables data …
[PDF][PDF] FLGUARD: Secure and Private Federated Learning.
Recently, a number of backdoor attacks against Federated Learning (FL) have been
proposed. In such attacks, an adversary injects poisoned model updates into the federated …
proposed. In such attacks, an adversary injects poisoned model updates into the federated …
FLUTE: fast and secure lookup table evaluations
A Brüggemann, R Hundt, T Schneider… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
The concept of using Lookup Tables (LUTs) instead of Boolean circuits is well-known and
been widely applied in a variety of applications, including FPGAs, image processing, and …
been widely applied in a variety of applications, including FPGAs, image processing, and …
Approximate multipliers using static segmentation: Error analysis and improvements
Approximate multipliers are used in error-tolerant applications, sacrificing the accuracy of
results to minimize power or delay. In this paper we investigate approximate multipliers …
results to minimize power or delay. In this paper we investigate approximate multipliers …
SynCirc: efficient synthesis of depth-optimized circuits for secure computation
Secure Multi-party Computation (MPC) allows to securely compute on private data. To make
MPC practical, logic synthesis can be used to automatically translate a description of the …
MPC practical, logic synthesis can be used to automatically translate a description of the …
Llvm-based circuit compilation for practical secure computation
T Heldmann, T Schneider, O Tkachenko… - … Conference on Applied …, 2021 - Springer
Multi-party computation (MPC) allows two or more parties to jointly and securely compute
functions over private inputs. Cryptographic protocols that realize MPC require functions to …
functions over private inputs. Cryptographic protocols that realize MPC require functions to …
FLUTE: Fast and Secure Lookup Table Evaluations (Full Version)
A Brüggemann, R Hundt, T Schneider… - Cryptology ePrint …, 2023 - eprint.iacr.org
The concept of using Lookup Tables (LUTs) instead of Boolean circuits is well-known and
been widely applied in a variety of applications, including FPGAs, image processing, and …
been widely applied in a variety of applications, including FPGAs, image processing, and …
Energy efficient multiply-accumulate unit using novel recursive multiplication for error-tolerant applications
T Karthikeyan, NM Sk - Integration, 2023 - Elsevier
The primary requirement for multimedia applications is energy efficient design along with
computational efficiency of portable devices. This work proposes an energy efficient MAC …
computational efficiency of portable devices. This work proposes an energy efficient MAC …