暂无分享,去创建一个
Meghan Cowan | Armin Alaghi | Brandon Reagen | Caroline Trippel | Vincent T. Lee | Deeksha Dangwal | Brandon Reagen | M. Cowan | Caroline Trippel | Deeksha Dangwal | Armin Alaghi
[1] Boro Sitnikovski. Racket Programming Language , 2021 .
[2] Catuscia Palamidessi,et al. Differential Privacy for Relational Algebra: Improving the Sensitivity Bounds via Constraint Systems , 2012, QAPL.
[3] Franz Franchetti,et al. SPIRAL: Code Generation for DSP Transforms , 2005, Proceedings of the IEEE.
[4] Paul F. Syverson,et al. A taxonomy of replay attacks [cryptographic protocols] , 1994, Proceedings The Computer Security Foundations Workshop VII.
[5] Hao Chen,et al. CHET: an optimizing compiler for fully-homomorphic neural-network inferencing , 2019, PLDI.
[6] Rosario Cammarota,et al. nGraph-HE2: A High-Throughput Framework for Neural Network Inference on Encrypted Data , 2019, IACR Cryptol. ePrint Arch..
[7] Andreas Haeberlen,et al. Linear dependent types for differential privacy , 2013, POPL.
[8] Sumit Gulwani,et al. Synthesis of loop-free programs , 2011, PLDI '11.
[9] Armin Biere,et al. Boolector: An Efficient SMT Solver for Bit-Vectors and Arrays , 2009, TACAS.
[10] Wei Dai,et al. EVA: an encrypted vector arithmetic language and compiler for efficient homomorphic computation , 2019, PLDI.
[11] An Wang,et al. Swizzle Inventor: Data Movement Synthesis for GPU Kernels , 2019, ASPLOS.
[12] Sumit Gulwani,et al. Oracle-guided component-based program synthesis , 2010, 2010 ACM/IEEE 32nd International Conference on Software Engineering.
[13] Sumit Gulwani,et al. Automated feedback generation for introductory programming assignments , 2012, PLDI.
[14] Michael Naehrig,et al. Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme , 2013, IMACC.
[15] Frank McSherry,et al. Privacy integrated queries: an extensible platform for privacy-preserving data analysis , 2009, SIGMOD Conference.
[16] Rastislav Bodík,et al. Chlorophyll : Synthesis-Aided Compiler for Low-Power Spatial Architectures by Phitchaya Mangpo Phothilimthana , 2015 .
[17] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[18] Silvio Micali,et al. A Completeness Theorem for Protocols with Honest Majority , 1987, STOC 1987.
[19] Mu Zhang,et al. Duet: an expressive higher-order language and linear type system for statically enforcing differential privacy , 2019, Proc. ACM Program. Lang..
[20] Gilles Barthe,et al. Programming language techniques for differential privacy , 2016, SIGL.
[21] Zvika Brakerski,et al. Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP , 2012, CRYPTO.
[22] Emina Torlak,et al. Growing solver-aided languages with rosette , 2013, Onward!.
[23] Renaud Sirdey,et al. Armadillo: A Compilation Chain for Privacy Preserving Applications , 2015, IACR Cryptol. ePrint Arch..
[24] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[25] Alex J. Malozemoff,et al. RAMPARTS: A Programmer-Friendly System for Building Homomorphic Encryption Applications , 2019, IACR Cryptol. ePrint Arch..
[26] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[27] Chris Peikert,et al. ALCHEMY: A Language and Compiler for Homomorphic Encryption Made easY , 2018, CCS.
[28] Craig Gentry,et al. (Leveled) fully homomorphic encryption without bootstrapping , 2012, ITCS '12.
[29] Craig Gentry,et al. Computing arbitrary functions of encrypted data , 2010, CACM.
[30] Ahmad-Reza Sadeghi,et al. TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits , 2015, 2015 IEEE Symposium on Security and Privacy.
[31] Armando Solar-Lezama,et al. Program synthesis by sketching , 2008 .
[32] David Evans,et al. Obliv-C: A Language for Extensible Data-Oblivious Computation , 2015, IACR Cryptol. ePrint Arch..
[33] Gu-Yeon Wei,et al. Cheetah: Optimizations and Methods for PrivacyPreserving Inference via Homomorphic Encryption , 2020, ArXiv.
[34] Rajeev Alur,et al. Syntax-guided synthesis , 2013, 2013 Formal Methods in Computer-Aided Design.
[35] Ratul Mahajan,et al. Differentially-private network trace analysis , 2010, SIGCOMM '10.
[36] Brett Hemenway,et al. SoK: General Purpose Compilers for Secure Multi-Party Computation , 2019, 2019 IEEE Symposium on Security and Privacy (SP).
[37] Jung Hee Cheon,et al. Homomorphic Encryption for Arithmetic of Approximate Numbers , 2017, ASIACRYPT.
[38] Sumit Gulwani,et al. From relational verification to SIMD loop synthesis , 2013, PPoPP '13.
[39] Anantha Chandrakasan,et al. Gazelle: A Low Latency Framework for Secure Neural Network Inference , 2018, IACR Cryptol. ePrint Arch..
[40] Michael Hicks,et al. Wysteria: A Programming Language for Generic, Mixed-Mode Multiparty Computations , 2014, 2014 IEEE Symposium on Security and Privacy.
[41] Vitaly Shmatikov,et al. Airavat: Security and Privacy for MapReduce , 2010, NSDI.
[42] Frederik Vercauteren,et al. Somewhat Practical Fully Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..
[43] Benjamin C. Pierce,et al. Distance makes the types grow stronger: a calculus for differential privacy , 2010, ICFP '10.
[44] Sanjit A. Seshia,et al. Combinatorial sketching for finite programs , 2006, ASPLOS XII.
[45] Gilles Barthe,et al. Probabilistic Relational Reasoning for Differential Privacy , 2012, TOPL.
[46] Hakjoo Oh,et al. Optimizing homomorphic evaluation circuits by program synthesis and term rewriting , 2020, PLDI.