Homomorphic SIM^2D operations: single instruction much more data
From MaRDI portal
Publication:1648801
Recommendations
Cites work
- scientific article; zbMATH DE number 3134390 (Why is no real title available?)
- scientific article; zbMATH DE number 1394292 (Why is no real title available?)
- (Leveled) fully homomorphic encryption without bootstrapping
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- A new distribution-sensitive secure sketch and popularity-proportional hashing
- ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?
- Advances in Cryptology - CRYPTO 2003
- Advances in cryptology -- ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7--11, 2014, Proceedings, Part II
- Advances in cryptology -- EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26--30, 2015. Proceedings. Part II
- Characterisation and estimation of the key rank distribution in the context of side channel evaluations
- Cryptographic hardware and embedded systems -- CHES 2016. 18th international conference, Santa Barbara, CA, USA, August 17--19, 2016. Proceedings
- Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests
- Efficient Fully Homomorphic Encryption from (Standard) LWE
- Efficient masked S-boxes processing -- a step forward
- Fast Software Encryption
- Faster Homomorphic Function Evaluation Using Non-integral Base Encoding
- Faster fully homomorphic encryption: bootstrapping in less than 0.1 seconds
- Faster homomorphic evaluation of discrete Fourier transforms
- Fixed-point arithmetic in SHE schemes
- Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP
- Fully homomorphic SIMD operations
- Fully homomorphic encryption from ring-LWE and security for key dependent messages
- Fully homomorphic encryption using ideal lattices
- Fully homomorphic encryption with polylog overhead
- Gaussian Mixture Models for Higher-Order Side Channel Analysis
- High-precision arithmetic in homomorphic encryption
- How fast can higher-order masking be in software?
- How to Estimate the Success Rate of Higher-Order Side-Channel Attacks
- Improved security for a ring-based fully homomorphic encryption scheme
- Masking against Side-Channel Attacks: A Formal Security Proof
- Multi-target DPA attacks: pushing DPA beyond the limits of a desktop computer
- On the Exact Success Rate of Side Channel Analysis in the Gaussian Model
- On the concrete hardness of learning with errors
- Optimization of bootstrapping in circuits
- Provably secure higher-order masking of AES
- Secure hardware implementation of nonlinear functions in the presence of glitches
- Soft analytical side-channel attacks
- The Wire-Tap Channel
- The world is not enough: another look on second-order DPA
- Topics in Cryptology – CT-RSA 2005
- Two halves make a whole: reducing data transfer in garbled circuits using half gates
- Very high order masking: efficient implementation and security evaluation
Cited in
(5)
This page was built for publication: Homomorphic \(\mathrm {SIM}^2\)D operations: single instruction much more data
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1648801)