Homomorphic SIM^2D operations: single instruction much more data
From MaRDI portal
Publication:1648801
DOI10.1007/978-3-319-78381-9_13zbMATH Open1420.94046OpenAlexW2794738056MaRDI QIDQ1648801FDOQ1648801
Authors: Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren
Publication date: 9 July 2018
Full work available at URL: https://doi.org/10.1007/978-3-319-78381-9_13
Recommendations
Cites Work
- Fully homomorphic encryption with polylog overhead
- Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP
- Fully homomorphic encryption using ideal lattices
- Fully homomorphic encryption from ring-LWE and security for key dependent messages
- Efficient Fully Homomorphic Encryption from (Standard) LWE
- Title not available (Why is that?)
- Title not available (Why is that?)
- (Leveled) fully homomorphic encryption without bootstrapping
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- Fully homomorphic SIMD operations
- Improved security for a ring-based fully homomorphic encryption scheme
- Advances in Cryptology - CRYPTO 2003
- Advances in cryptology -- ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7--11, 2014, Proceedings, Part II
- The Wire-Tap Channel
- Secure hardware implementation of nonlinear functions in the presence of glitches
- The world is not enough: another look on second-order DPA
- Fast Software Encryption
- Advances in cryptology -- EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26--30, 2015. Proceedings. Part II
- Provably secure higher-order masking of AES
- Gaussian Mixture Models for Higher-Order Side Channel Analysis
- Topics in Cryptology – CT-RSA 2005
- Cryptographic hardware and embedded systems -- CHES 2016. 18th international conference, Santa Barbara, CA, USA, August 17--19, 2016. Proceedings
- On the concrete hardness of learning with errors
- Soft analytical side-channel attacks
- Very high order masking: efficient implementation and security evaluation
- How fast can higher-order masking be in software?
- On the Exact Success Rate of Side Channel Analysis in the Gaussian Model
- Masking against Side-Channel Attacks: A Formal Security Proof
- Two halves make a whole: reducing data transfer in garbled circuits using half gates
- A new distribution-sensitive secure sketch and popularity-proportional hashing
- Fixed-point arithmetic in SHE schemes
- High-precision arithmetic in homomorphic encryption
- ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?
- Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests
- Multi-target DPA attacks: pushing DPA beyond the limits of a desktop computer
- Faster fully homomorphic encryption: bootstrapping in less than 0.1 seconds
- Characterisation and estimation of the key rank distribution in the context of side channel evaluations
- Optimization of bootstrapping in circuits
- Efficient masked S-boxes processing -- a step forward
- Faster Homomorphic Function Evaluation Using Non-integral Base Encoding
- How to Estimate the Success Rate of Higher-Order Side-Channel Attacks
- Faster homomorphic evaluation of discrete Fourier transforms
Cited In (5)
This page was built for publication: Homomorphic \(\mathrm {SIM}^2\)D operations: single instruction much more data
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1648801)