搜索结果: 1-15 共查到“compiler”相关记录20条 . 查询时间(0.036 秒)
Formal Verification of a Constant-Time Preserving C Compiler
Compilation Formal verification Constant-time security
2019/8/19
Timing side-channels are arguably one of the main sources of vulnerabilities in cryptographic implementations. One effective mitigation against timing side-channels is to write programs that do not pe...
nGraph-HE: A Graph Compiler for Deep Learning on Homomorphically Encrypted Data
Homomorphic encryption intermediate representation deep learning
2019/4/3
Homomorphic encryption (HE)---the ability to perform computation on encrypted data---is an attractive remedy to increasing concerns about data privacy in deep learning (DL). However, building DL model...
Generalizing the SPDZ Compiler For Other Protocols
cryptographic protocols secure multiparty computation
2018/8/21
Protocols for secure multiparty computation (MPC) enable a set of mutually distrusting parties to compute an arbitrary function of their inputs while preserving basic security properties like \emph{pr...
Matrioska: A Compiler for Multi-Key Homomorphic Signatures
Multi-Key Homomorphic Signatures Compiler
2018/6/25
Multi-Key Homomorphic Signatures (MKHS) enable clients in a system to sign and upload messages to an untrusted server. At any later point in time, the server can perform a computation CC on data provi...
CAMFAS: A Compiler Approach to Mitigate Fault Attacks via Enhanced SIMDization
Fault attack SIMD Vectorization
2017/11/13
The trend of supporting wide vector units in general purpose microprocessors suggests opportunities for developing a new and elegant compilation approach to mitigate the impact of faults to cryptograp...
Yet Another Compiler for Active Security or: Efficient MPC Over Arbitrary Rings
MPC Blackbox Compiler
2017/9/25
We present a very simple yet very powerful idea for turning any semi-honestly secure MPC protocol into an actively secure one, at the price of reducing the threshold of tolerated corruptions.
Privacy for arbitrary encrypted remote computation in the cloud depends on the running code on the server being obfuscated from the standpoint of the operator in the computer room. This paper shows fo...
A Unilateral-to-Mutual Authentication Compiler for Key Exchange (with Applications to Client Authentication in TLS 1.3)
TLS key exchange authentication
2016/7/20
We study the question of how to build "compilers" that transform a unilaterally authenticated (UA) key-exchange protocol into a mutually-authenticated (MA) one. We present a simple and efficient compi...
Cool: A Portable Project for Teaching Compiler Construction
Cool Portable Project Teaching Compiler Construction
2016/5/25
The compiler course is a xture of undergraduate computer science education. Most CS programs oer a course on compilers that includes a substantial pro ject where students write a compiler for a smal...
A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-wise Tampering and Permutations
Non-malleable Codes Explicit Construction Information Theoretic
2016/1/6
A non-malleable code protects messages against a class of tampering functions. Informally,
a code is non-malleable if the effect of applying any tampering function on an encoded message
is to either...
Compositional Verification of Higher-Order Masking: Application to a Verifying Masking Compiler
Masking Composition Formal Methods
2015/12/30
The prevailing approach for building masked algorithms that can resist
higher-order differential power analysis is to develop gadgets, that is, masked
gates used as atomic blocks, that securely impl...
A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer
game-theoretic security universal composability local universal composability
2015/12/22
In this paper, we consider the following question: Does composing protocols having gametheoretic
security result in a secure protocol in the sense of game-theoretic security? In order
to discuss the...
A Compiler for Two-level Phonological Rules.
VHDL “Digital Lock” design implemtntation on Altera DE2 board and Area and Time optimization of ASIC “FIFO” design using Synopsys design compiler
VHDL design of LCD display integrated circuit the design optimization tool
2014/12/31
Part 1: In this the main objective of the project was to produce a VHDL design which can be programmed on Altera DE2 board. This project gives an overview of how different components of DE2 board can ...
Generalized Instruction Selector Generation: The Automatic Construction of Instruction Selectors from Descriptions of Compiler Internal Forms and Target Machines
Architecture Code Generation Compilers
2014/12/18
One of the most difficult tasks a compiler writer faces is the construction of the instruction selector. The instruction selector is that part of the compiler that translates compiler intermediate rep...