| 1 |
Gazelle: A Low Latency Framework for Secure Neural Network Inference
Chiraag Juvekar, Vinod Vaikuntanathan, Anantha Chandrakasan
|
👻
Ghosted
|
cs.CR
|
1.0K |
8 years ago |
| 2 |
Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds
Mark Bun, Thomas Steinke
|
👻
Ghosted
|
cs.CR
|
932 |
9 years ago |
| 3 |
Optimal Selfish Mining Strategies in Bitcoin
Ayelet Sapirshtein, Yonatan Sompolinsky, Aviv Zohar
|
👻
Ghosted
|
cs.CR
|
645 |
10 years ago |
| 4 |
Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications
M. Sadegh Riazi, Christian Weinert, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
536 |
8 years ago |
| 5 |
Decentralization in Bitcoin and Ethereum Networks
Adem Efe Gencer, Soumya Basu, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
413 |
8 years ago |
| 6 |
Distributed Differential Privacy via Shuffling
Albert Cheu, Adam Smith, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
397 |
7 years ago |
| 7 |
CacheZoom: How SGX Amplifies The Power of Cache Attacks
Ahmad Moghimi, Gorka Irazoqui, Thomas Eisenbarth
|
👻
Ghosted
|
cs.CR
|
351 |
9 years ago |
| 8 |
Breaking Symmetric Cryptosystems using Quantum Period Finding
Marc Kaplan, Gaëtan Leurent, ... (+2 more)
|
👻
Ghosted
|
quant-ph
|
330 |
10 years ago |
| 9 |
XONN: XNOR-based Oblivious Deep Neural Network Inference
M. Sadegh Riazi, Mohammad Samragh, ... (+4 more)
|
👻
Ghosted
|
cs.CR
|
308 |
7 years ago |
| 10 |
Concurrency and Privacy with Payment-Channel Networks
Giulio Malavolta, Pedro Moreno-Sanchez, ... (+3 more)
|
👻
Ghosted
|
cs.CR
|
302 |
6 years ago |
| 11 |
PassGAN: A Deep Learning Approach for Password Guessing
Briland Hitaj, Paolo Gasti, ... (+2 more)
|
💀
404 Not Found
|
cs.CR
|
293 |
8 years ago |
| 12 |
Constructions of Good Entanglement-Assisted Quantum Error Correcting Codes
Kenza Guenda, Somphong Jitman, T. Aaron Gulliver
|
👻
Ghosted
|
cs.IT
|
271 |
9 years ago |
| 13 |
The Privacy Blanket of the Shuffle Model
Borja Balle, James Bell, ... (+2 more)
|
👻
Ghosted
|
cs.LG
|
268 |
7 years ago |
| 14 |
SoK: Transparent Dishonesty: front-running attacks on Blockchain
Shayan Eskandari, Seyedehmahsa Moosavi, Jeremy Clark
|
👻
Ghosted
|
cs.CR
|
263 |
7 years ago |
| 15 |
Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit
Kaihua Qin, Liyi Zhou, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
236 |
6 years ago |
| 16 |
Indistinguishability Obfuscation from Well-Founded Assumptions
Aayush Jain, Huijia Lin, Amit Sahai
|
👻
Ghosted
|
cs.CR
|
235 |
5 years ago |
| 17 |
Designing Secure Ethereum Smart Contracts: A Finite State Machine Based Approach
Anastasia Mavridou, Aron Laszka
|
👻
Ghosted
|
cs.CR
|
233 |
8 years ago |
| 18 |
Trident: Efficient 4PC Framework for Privacy Preserving Machine Learning
Harsh Chaudhari, Rahul Rachuri, Ajith Suresh
|
👻
Ghosted
|
cs.LG
|
231 |
6 years ago |
| 19 |
Sapphire: A Configurable Crypto-Processor for Post-Quantum Lattice-based Protocols
Utsav Banerjee, Tenzin S. Ukyab, Anantha P. Chandrakasan
|
👻
Ghosted
|
cs.CR
|
225 |
6 years ago |
| 20 |
Undetectable Watermarks for Language Models
Miranda Christ, Sam Gunn, Or Zamir
|
👻
Ghosted
|
cs.CR
|
224 |
2 years ago |
| 21 |
BLAZE: Blazing Fast Privacy-Preserving Machine Learning
Arpita Patra, Ajith Suresh
|
👻
Ghosted
|
cs.CR
|
223 |
5 years ago |
| 22 |
Data mining for detecting Bitcoin Ponzi schemes
Massimo Bartoletti, Barbara Pes, Sergio Serusi
|
👻
Ghosted
|
cs.CR
|
216 |
8 years ago |
| 23 |
On the qubit routing problem
Alexander Cowtan, Silas Dilkes, ... (+4 more)
|
👻
Ghosted
|
quant-ph
|
199 |
7 years ago |
| 24 |
nGraph-HE2: A High-Throughput Framework for Neural Network Inference on Encrypted Data
Fabian Boemer, Anamaria Costache, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
191 |
6 years ago |
| 25 |
nGraph-HE: A Graph Compiler for Deep Learning on Homomorphically Encrypted Data
Fabian Boemer, Yixing Lao, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
190 |
7 years ago |
| 26 |
Linear Codes with Two or Three Weights From Quadratic Bent Functions
Zhengchun Zhou, Nian Li, ... (+2 more)
|
👻
Ghosted
|
cs.IT
|
181 |
10 years ago |
| 27 |
SWIFT: Super-fast and Robust Privacy-Preserving Machine Learning
Nishat Koti, Mahak Pancholi, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
176 |
5 years ago |
| 28 |
Cryptanalytic Extraction of Neural Network Models
Nicholas Carlini, Matthew Jagielski, Ilya Mironov
|
🌅
Old Age
|
cs.LG
|
159 |
6 years ago |
| 29 |
Security of the Fiat-Shamir Transformation in the Quantum Random-Oracle Model
Jelle Don, Serge Fehr, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
159 |
7 years ago |
| 30 |
Secure Evaluation of Quantized Neural Networks
Anders Dalskov, Daniel Escudero, Marcel Keller
|
👻
Ghosted
|
cs.CR
|
156 |
6 years ago |
| 31 |
Faster computation of isogenies of large prime degree
Daniel Bernstein, Luca de Feo, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
154 |
6 years ago |
| 32 |
ASTRA: High Throughput 3PC over Rings with Application to Secure Prediction
Harsh Chaudhari, Ashish Choudhury, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
151 |
6 years ago |
| 33 |
Quantum Differential and Linear Cryptanalysis
Marc Kaplan, Gaëtan Leurent, ... (+2 more)
|
👻
Ghosted
|
quant-ph
|
148 |
10 years ago |
| 34 |
Euclidean and Hermitian LCD MDS codes
Claude Carlet, Sihem Mesnager, ... (+2 more)
|
👻
Ghosted
|
cs.IT
|
140 |
9 years ago |
| 35 |
A Concurrent Perspective on Smart Contracts
Ilya Sergey, Aquinas Hobor
|
👻
Ghosted
|
cs.DC
|
137 |
9 years ago |
| 36 |
An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices
Paul Kirchner, Pierre-Alain Fouque
|
👻
Ghosted
|
cs.CR
|
135 |
10 years ago |
| 37 |
CertLedger: A New PKI Model with Certificate Transparency Based on Blockchain
Murat Yasin Kubilay, Mehmet Sabir Kiraz, Haci Ali Mantar
|
👻
Ghosted
|
cs.CR
|
133 |
7 years ago |
| 38 |
VeriSolid: Correct-by-Design Smart Contracts for Ethereum
Anastasia Mavridou, Aron Laszka, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
132 |
7 years ago |
| 39 |
Circuit Transformations for Quantum Architectures
Andrew M. Childs, Eddie Schoute, Cem M. Unsal
|
👻
Ghosted
|
quant-ph
|
126 |
7 years ago |
| 40 |
Quantum homomorphic encryption for polynomial-sized circuits
Yfke Dulek, Christian Schaffner, Florian Speelman
|
👻
Ghosted
|
quant-ph
|
121 |
9 years ago |
| 41 |
Non-Malleable Extractors and Codes, with their Many Tampered Extensions
Eshan Chattopadhyay, Vipul Goyal, Xin Li
|
👻
Ghosted
|
cs.CR
|
117 |
10 years ago |
| 42 |
Galois Self-Dual Constacyclic Codes
Yun Fan, Liang Zgang
|
👻
Ghosted
|
cs.IT
|
117 |
10 years ago |
| 43 |
Everything is a Race and Nakamoto Always Wins
Amir Dembo, Sreeram Kannan, ... (+5 more)
|
👻
Ghosted
|
cs.CR
|
116 |
5 years ago |
| 44 |
An analysis of Bitcoin OP_RETURN metadata
Massimo Bartoletti, Livio Pompianu
|
👻
Ghosted
|
cs.CR
|
116 |
9 years ago |
| 45 |
IDMoB: IoT Data Marketplace on Blockchain
Kazım Rıfat Özyılmaz, Mehmet Doğan, Arda Yurdakul
|
👻
Ghosted
|
cs.CR
|
114 |
7 years ago |
| 46 |
Provably weak instances of Ring-LWE
Yara Elias, Kristin E. Lauter, ... (+2 more)
|
👻
Ghosted
|
cs.CR
|
112 |
11 years ago |
| 47 |
Quantum Attacks without Superposition Queries: the Offline Simon's Algorithm
Xavier Bonnetain, Akinori Hosoyamada, ... (+3 more)
|
👻
Ghosted
|
quant-ph
|
111 |
6 years ago |
| 48 |
Overview of Polkadot and its Design Considerations
Jeff Burdges, Alfonso Cevallos, ... (+9 more)
|
👻
Ghosted
|
cs.CR
|
106 |
5 years ago |
| 49 |
Quantum Lightning Never Strikes the Same State Twice
Mark Zhandry
|
👻
Ghosted
|
cs.CR
|
106 |
8 years ago |
| 50 |
TxProbe: Discovering Bitcoin's Network Topology Using Orphan Transactions
Sergi Delgado-Segura, Surya Bakshi, ... (+5 more)
|
👻
Ghosted
|
cs.CR
|
96 |
7 years ago |