Privacy-preserving functional IP verification utilizing fully homomorphic encryption
暂无分享,去创建一个
Michail Maniatakos | Anastasis Keliris | Charalambos Konstantinou | Charalambos Konstantinou | M. Maniatakos | A. Keliris
[1] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[2] J. Skytta,et al. On Parallelization of High-Speed Processors for Elliptic Curve Cryptography , 2008, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[3] Vinod Vaikuntanathan,et al. On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption , 2012, STOC '12.
[4] Andreas G. Veneris,et al. Path directed abstraction and refinement in SAT-based design debugging , 2012, DAC Design Automation Conference 2012.
[5] D. Kelf,et al. Your core - my problem? integration and verification of IP , 2001, Proceedings of the 38th Design Automation Conference (IEEE Cat. No.01CH37232).
[6] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[7] Matteo Pradella,et al. Bounded satisfiability checking of metric temporal logic specifications , 2013, TSEM.
[8] Antonio García,et al. IPP@HDL: Efficient Intellectual Property Protection Scheme for IP Cores , 2007, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[9] Frederik Vercauteren,et al. Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes , 2010, Public Key Cryptography.
[10] Wolfgang Fichtner,et al. Functional verification of intellectual properties (IP): a simulation-based solution for an application-specific instruction-set processor , 1999, International Test Conference 1999. Proceedings (IEEE Cat. No.99CH37034).
[11] Nektarios Georgios Tsoutsos,et al. HEROIC: Homomorphically EncRypted One Instruction Computer , 2014, 2014 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[12] Tom Anderson,et al. Your core— my problem? (panel session): integration and verification of IP , 2001, DAC '01.
[13] Matthew Smith,et al. How Practical is Homomorphically Encrypted Program Execution? An Implementation and Performance Evaluation , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[14] Rafail Ostrovsky,et al. Zero-knowledge from secure multiparty computation , 2007, STOC '07.
[15] Craig Gentry,et al. A fully homomorphic encryption scheme , 2009 .
[16] F. Fummi,et al. The use of SystemC for design verification and integration test of IP-cores , 2001, Proceedings 14th Annual IEEE International ASIC/SOC Conference (IEEE Cat. No.01TH8558).
[17] Michael Brenner,et al. Poster: an implementation of the fully homomorphic smart-vercauteren crypto-system , 2011, CCS '11.
[18] Tyler Moore,et al. Measuring the Cost of Cybercrime , 2012, WEIS.
[19] Craig Gentry,et al. (Leveled) fully homomorphic encryption without bootstrapping , 2012, ITCS '12.