Homomorphic SIM^2D operations: single instruction much more data
From MaRDI portal
Publication:1648801
DOI10.1007/978-3-319-78381-9_13zbMATH Open1420.94046OpenAlexW2794738056MaRDI QIDQ1648801FDOQ1648801
Authors: Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren
Publication date: 9 July 2018
Full work available at URL: https://doi.org/10.1007/978-3-319-78381-9_13
Recommendations
Cites Work
- Fully homomorphic encryption with polylog overhead
- Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP
- Fully homomorphic encryption using ideal lattices
- Fully homomorphic encryption from ring-LWE and security for key dependent messages
- Efficient Fully Homomorphic Encryption from (Standard) LWE
- Title not available (Why is that?)
- Title not available (Why is that?)
- (Leveled) fully homomorphic encryption without bootstrapping
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- Fully homomorphic SIMD operations
- Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme
- Advances in Cryptology - CRYPTO 2003
- Advances in cryptology -- ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7--11, 2014, Proceedings, Part II
- The Wire-Tap Channel
- Secure hardware implementation of nonlinear functions in the presence of glitches
- The world is not enough: another look on second-order DPA
- Fast Software Encryption
- Advances in cryptology -- EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26--30, 2015. Proceedings. Part II
- Provably secure higher-order masking of AES
- Gaussian Mixture Models for Higher-Order Side Channel Analysis
- Topics in Cryptology – CT-RSA 2005
- Cryptographic hardware and embedded systems -- CHES 2016. 18th international conference, Santa Barbara, CA, USA, August 17--19, 2016. Proceedings
- On the concrete hardness of learning with errors
- Soft Analytical Side-Channel Attacks
- Very High Order Masking: Efficient Implementation and Security Evaluation
- How Fast Can Higher-Order Masking Be in Software?
- On the Exact Success Rate of Side Channel Analysis in the Gaussian Model
- Masking against Side-Channel Attacks: A Formal Security Proof
- Two Halves Make a Whole
- A new distribution-sensitive secure sketch and popularity-proportional hashing
- Fixed-point arithmetic in SHE schemes
- High-precision arithmetic in homomorphic encryption
- ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?
- Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests
- Multi-target DPA Attacks: Pushing DPA Beyond the Limits of a Desktop Computer
- Faster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 Seconds
- Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations
- Optimization of Bootstrapping in Circuits
- Efficient Masked S-Boxes Processing – A Step Forward –
- Faster Homomorphic Function Evaluation Using Non-integral Base Encoding
- How to Estimate the Success Rate of Higher-Order Side-Channel Attacks
- Faster Homomorphic Evaluation of Discrete Fourier Transforms
Cited In (3)
This page was built for publication: Homomorphic \(\mathrm {SIM}^2\)D operations: single instruction much more data
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1648801)