SoK: 5 years of neural differential cryptanalysis

D Gerault, A Hambitzer, M Huppert… - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Abstract At CRYPTO 2019, A. Gohr introduced Neural Differential Cryptanalysis by applying
deep learning to modern block cipher cryptanalysis. Surprisingly, the resulting neural …

[PDF][PDF] MPCDiff: Testing and Repairing MPC-Hardened Deep Learning Models

Q Pang, Y Yuan, S Wang - 2024 - ndss-symposium.org
Secure multi-party computation (MPC) has recently become prominent as a concept to
enable multiple parties to perform privacy-preserving machine learning without leaking …

PP-CSA: Practical Privacy-Preserving Software Call Stack Analysis

Z Wang, P Ma, H Wang, S Wang - Proceedings of the ACM on …, 2024 - dl.acm.org
Software call stack is a sequence of function calls that are executed during the runtime of a
software program. Software call stack analysis (CSA) is widely used in software engineering …