[SW Security] A Tale of Two Trees: One Writes, and Other Reads. Optimized Oblivious Accesses to Large-Scale Blockchains, Privacy Enhancing Technologies Symposium (PETS), July 2020

A Tale of Two Trees: One Writes, and Other Reads. Optimized Oblivious Accesses to Large-Scale Blockchains,

Duc V. Le, Lizzy Tengana Hurtado, Adil Ahmad, Mohsen Minaei, Byoungyoung Lee, and Aniket Kate,

Privacy Enhancing Technologies Symposium (PETS) 2020

0
0

International Papers

Privacy Enhancing Computing SLOTHE: Lazy Approximation of Non-Arithmetic Neural Network Functions over Encrypted Data, USENIX Security 2025
Privacy Enhancing Computing Affinity-based Optimizations for TFHE on Processing-in-DRAM, ASPLOS 2025 Affinity-based Optimizations for TFHE on Processing-in-DRAM, ASPLOS 2025
Privacy Enhancing Computing LOHEN: Layer-wise Optimizations for Neural Network Inferences over Encrypted Data with high Performance or Accuracy, USENIX Security 2025
Privacy Enhancing Computing Affinity-based Optimizations of Homomorphic Encryption Operations on Processing-in-DRAM, DAC WIP 2024