搜索结果: 1-15 共查到“军队指挥学 compiler”相关记录15条 . 查询时间(0.078 秒)
Formal Verification of a Constant-Time Preserving C Compiler
Compilation Formal verification Constant-time security
2019/8/19
Timing side-channels are arguably one of the main sources of vulnerabilities in cryptographic implementations. One effective mitigation against timing side-channels is to write programs that do not pe...
nGraph-HE: A Graph Compiler for Deep Learning on Homomorphically Encrypted Data
Homomorphic encryption intermediate representation deep learning
2019/4/3
Homomorphic encryption (HE)---the ability to perform computation on encrypted data---is an attractive remedy to increasing concerns about data privacy in deep learning (DL). However, building DL model...
Generalizing the SPDZ Compiler For Other Protocols
cryptographic protocols secure multiparty computation
2018/8/21
Protocols for secure multiparty computation (MPC) enable a set of mutually distrusting parties to compute an arbitrary function of their inputs while preserving basic security properties like \emph{pr...
Matrioska: A Compiler for Multi-Key Homomorphic Signatures
Multi-Key Homomorphic Signatures Compiler
2018/6/25
Multi-Key Homomorphic Signatures (MKHS) enable clients in a system to sign and upload messages to an untrusted server. At any later point in time, the server can perform a computation CC on data provi...
CAMFAS: A Compiler Approach to Mitigate Fault Attacks via Enhanced SIMDization
Fault attack SIMD Vectorization
2017/11/13
The trend of supporting wide vector units in general purpose microprocessors suggests opportunities for developing a new and elegant compilation approach to mitigate the impact of faults to cryptograp...
Yet Another Compiler for Active Security or: Efficient MPC Over Arbitrary Rings
MPC Blackbox Compiler
2017/9/25
We present a very simple yet very powerful idea for turning any semi-honestly secure MPC protocol into an actively secure one, at the price of reducing the threshold of tolerated corruptions.
Privacy for arbitrary encrypted remote computation in the cloud depends on the running code on the server being obfuscated from the standpoint of the operator in the computer room. This paper shows fo...
A Unilateral-to-Mutual Authentication Compiler for Key Exchange (with Applications to Client Authentication in TLS 1.3)
TLS key exchange authentication
2016/7/20
We study the question of how to build "compilers" that transform a unilaterally authenticated (UA) key-exchange protocol into a mutually-authenticated (MA) one. We present a simple and efficient compi...
A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-wise Tampering and Permutations
Non-malleable Codes Explicit Construction Information Theoretic
2016/1/6
A non-malleable code protects messages against a class of tampering functions. Informally,
a code is non-malleable if the effect of applying any tampering function on an encoded message
is to either...
Compositional Verification of Higher-Order Masking: Application to a Verifying Masking Compiler
Masking Composition Formal Methods
2015/12/30
The prevailing approach for building masked algorithms that can resist
higher-order differential power analysis is to develop gadgets, that is, masked
gates used as atomic blocks, that securely impl...
A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer
game-theoretic security universal composability local universal composability
2015/12/22
In this paper, we consider the following question: Does composing protocols having gametheoretic
security result in a secure protocol in the sense of game-theoretic security? In order
to discuss the...
In recent work, Ishai, Prabhakaran and Sahai (CRYPTO 2008) presented a new compiler (hereafter the IPS compiler) for constructing protocols that are secure in the presence of malicious adversaries wit...
A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on $\Sigma$-Protocols
implementation Zero-Knowledge Protocol Compiler Formal Verification
2010/7/14
Zero-knowledge proofs of knowledge (ZK-PoK) are important building blocks for numerous cryptographic applications. Although ZK-PoK have very useful properties, their real world deployment is typically...
First Steps Toward a Cryptography-Aware Language and Compiler
Cryptography-Aware Language Compiler cryptography-aware domain-specific language
2009/2/9
When developing secure, high-performance cryptographic software,
the programmer is presented with a wide range of problems. Not
only must they be conversant with pertinent scientic results, they mu...
Although cryptographic implementation tasks are often undertaken
by expert programmers, a plethora of performance and security
driven options, as well as more mundane software engineering issues, st...