Results 61 to 70 of about 196,760 (255)

Security Guidelines for Implementing Homomorphic Encryption

open access: yesIACR Cryptology ePrint Archive
Fully Homomorphic Encryption (FHE) is a cryptographic primitive that allows performing arbitrary operations on encrypted data. Since the conception of the idea in [RAD78], it has been considered a holy grail of cryptography.
Jean-Philippe Bossuat   +18 more
semanticscholar   +1 more source

Over 100x Faster Bootstrapping in Fully Homomorphic Encryption through Memory-centric Optimization with GPUs

open access: yesIACR Cryptology ePrint Archive, 2021
Fully Homomorphic encryption (FHE) has been gaining in popularity as an emerging means of enabling an unlimited number of operations in an encrypted message without decryption. A major drawback of FHE is its high computational cost.
Wonkyung Jung   +4 more
semanticscholar   +1 more source

Homomorphic Data Isolation for Hardware Trojan Protection

open access: yes, 2015
The interest in homomorphic encryption/decryption is increasing due to its excellent security properties and operating facilities. It allows operating on data without revealing its content.
Alanwar, Amr   +4 more
core   +1 more source

Medha: Microcoded Hardware Accelerator for computing on Encrypted Data

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Homomorphic encryption enables computation on encrypted data, and hence it has a great potential in privacy-preserving outsourcing of computations to the cloud.
Ahmet Can Mert   +6 more
doaj   +1 more source

Homomorphic encryption and some black box attacks

open access: yes, 2020
This paper is a compressed summary of some principal definitions and concepts in the approach to the black box algebra being developed by the authors. We suggest that black box algebra could be useful in cryptanalysis of homomorphic encryption schemes ...
A Acar   +10 more
core   +1 more source

Building an Intelligent Cardiovascular System Platform: Embedding Artificial Intelligence across All Facets of Cardiovascular Medicine

open access: yesAdvanced Intelligent Systems, EarlyView.
This paper presents an integrated AI‐driven cardiovascular platform unifying multimodal data, predictive analytics, and real‐time monitoring. It demonstrates how artificial intelligence—from deep learning to federated learning—enables early diagnosis, precision treatment, and personalized rehabilitation across the full disease lifecycle, promoting a ...
Mowei Kong   +4 more
wiley   +1 more source

Exploring the Application and Characteristics of Homomorphic Encryption Based on Pixel Scrambling Algorithm in Image Processing

open access: yesBig Data and Cognitive Computing
Homomorphic encryption is well known to researchers, yet its application in image processing is scarce. The diversity of image processing algorithms makes homomorphic encryption implementation challenging.
Tieyu Zhao
doaj   +1 more source

Homomorphic Encryption with Access Policies: Characterization and New Constructions

open access: yes, 2013
A characterization of predicate encryption (PE) with support for homomorphic operations is presented and we describe the homomorphic properties of some existing PE constructions.
Clear, Michael   +2 more
core   +1 more source

Area-Efficient Number Theoretic Transform Architecture for Homomorphic Encryption

open access: yesIEEE Transactions on Circuits and Systems Part 1: Regular Papers, 2023
Homomorphic encryption (HE) has emerged as an ideal cryptographic technology for meaningful computations on encrypted data. Not only does HE secure private information even if the ciphertext is leaked, but it also maintains data integrity when inferring ...
Phap Duong-Ngoc   +3 more
semanticscholar   +1 more source

Frequency Shaping for Improving a Trade‐Off Between Control and Privacy Performance: Beyond Differential Privacy

open access: yesInternational Journal of Robust and Nonlinear Control, EarlyView.
ABSTRACT In privacy protection of control systems, a trade‐off between control performance and privacy level is often pointed out. Our goal in this paper is to improve this trade‐off by shaping the frequency of noise added for privacy protection when the control objective is to track a reference signal, which is taken as a piece of information whose ...
Rintaro Watanabe   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy