VLSI Design and FPGA implementation of an NTT hardware accelerator for Homomorphic seal-embedded library
Homomorphic Encryption (HE) allows performing specific algebraic computations on
encrypted data without the need for decryption. For this reason, HE is emerging as a strong …
encrypted data without the need for decryption. For this reason, HE is emerging as a strong …
Modern Hardware Security: A Review of Attacks and Countermeasures
J Mishra, SK Sahay - arxiv preprint arxiv:2501.04394, 2025 - arxiv.org
With the exponential rise in the use of cloud services, smart devices, and IoT devices,
advanced cyber attacks have become increasingly sophisticated and ubiquitous …
advanced cyber attacks have become increasingly sophisticated and ubiquitous …
Aloha-he: A low-area hardware accelerator for client-side operations in homomorphic encryption
Homomorphic encryption (HE) has gained broad attention in recent years as it allows
computations on encrypted data enabling secure cloud computing. Deploying HE presents a …
computations on encrypted data enabling secure cloud computing. Deploying HE presents a …
[書籍][B] High Performance Privacy Preserving AI
Artificial intelligence (AI) depends on data. In sensitive domains–such as healthcare,
security, finance, and many more–there is therefore a tension between unleashing the …
security, finance, and many more–there is therefore a tension between unleashing the …
Spread Spectrum-Based Countermeasures for Cryptographic RISC-V SoC
Side-channel analysis attacks have become the primary method for exploiting the
vulnerabilities of cryptographic devices. Therefore, focusing on countermeasures to …
vulnerabilities of cryptographic devices. Therefore, focusing on countermeasures to …
PASTA on Edge: Cryptoprocessor for Hybrid Homomorphic Encryption
Abstract Fully Homomorphic Encryption (FHE) enables privacy-preserving computation but
imposes significant computational and communication overhead on the client for the public …
imposes significant computational and communication overhead on the client for the public …
In-Memory Encryption using XOR-based Feistel Cipher in SRAM Array
S Kavitha, BS Reniwal - 2024 IEEE International Symposium …, 2024 - ieeexplore.ieee.org
Data security has become increasingly vital in modern computing systems, with the rise of
sophisticated cyber threats and the widespread use of digital information. In-Memory …
sophisticated cyber threats and the widespread use of digital information. In-Memory …
5G Channel Estimation Kernels on RISC-V Vector Digital Signal Processors
Each generation of the wireless communication networks has contiguous demands for
higher computing capabilities and lower the power consumption in the integrated circuitry …
higher computing capabilities and lower the power consumption in the integrated circuitry …
On designing hardware accelerator-based systems: interfaces, taxes and benefits
Z Azad - 2023 - search.proquest.com
Abstract Complementary Metal Oxide Semiconductor (CMOS) Technology scaling has
slowed down. One promising approach to sustain the historic performance improvement of …
slowed down. One promising approach to sustain the historic performance improvement of …
[PDF][PDF] A Bibliography of Publications about the RISC-V Open Source Computer Architecture
NHF Beebe - 2025 - netlib.org
A Bibliography of Publications about the RISC-V Open Source Computer Architecture Page
1 A Bibliography of Publications about the RISC-V Open Source Computer Architecture …
1 A Bibliography of Publications about the RISC-V Open Source Computer Architecture …