A Heterogeneous Abstract Machine for Encrypted and Unencrypted Computation (original) (raw)

On the Security of Practical and Complete Homomorphic Encrypted Computation

Jonathan Bowen

IACR Cryptol. ePrint Arch., 2016

View PDFchevron_right

A Fully Homomorphic Crypto-Processor Design: Correctness of a Secret Computer

Jonathan Bowen, Peter Breuer

Proc. ESSoS'13, 2013

View PDFchevron_right

Towards a working fully homomorphic crypto-processor: Practice and the secret computer

Peter Breuer

2014

View PDFchevron_right

Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values

Debayan Gupta, Kevin Butler, Joan Feigenbaum

21st ACM Conference on Computer and Communications Security, 2014

View PDFchevron_right

ArctyrEX : Accelerated Encrypted Execution of General-Purpose Applications

Cédric Augonnet

arXiv (Cornell University), 2023

View PDFchevron_right

Towards Practical Program Execution over Fully Homomorphic Encryption Schemes

Carlos Melchor

2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 2013

View PDFchevron_right

Coyote: A Compiler for Vectorizing Encrypted Arithmetic Circuits

Raghav Malik

Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 3

View PDFchevron_right

A Review of Homomorphic Encryption Libraries for Secure Computation

Praneeth Vepakomma

View PDFchevron_right

HACCLE: metaprogramming for secure multi-party computation

Raghav Malik

Proceedings of the 20th ACM SIGPLAN International Conference on Generative Programming: Concepts and Experiences

View PDFchevron_right

A First Practical Fully Homomorphic Crypto-Processor Design: The Secret Computer is Nearly Here

Jonathan Bowen, Peter Breuer

View PDFchevron_right

HACCLE: Metaprogramming for Secure Multi-Party Computation -- Extended Version

Raghav Malik

arXiv: Programming Languages, 2021

View PDFchevron_right

HACCLE: An Ecosystem for Building Secure Multi-Party Computations

Raghav Malik

ArXiv, 2020

View PDFchevron_right

On Obfuscating Compilation for Encrypted Computing

Peter Breuer

2017

View PDFchevron_right

Secure Execution of Computations in Untrusted Hosts

Richard Brooks

Lecture Notes in Computer Science, 2006

View PDFchevron_right

Parallel Homomorphic Encryption

Seny Kamara

2011

View PDFchevron_right

On Security in Encrypted Computing

Jonathan Bowen

2018

View PDFchevron_right

CoPHEE: Co-processor for Partially Homomorphic Encrypted Execution

Mohammed Ashraf

2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2019

View PDFchevron_right

The Next Frontier of Security: Homomorphic Encryption in Action

IJRASET Publication

International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2024

View PDFchevron_right

E3: Accelerating Fully Homomorphic Encryption by Bridging Modular and Bit-Level Arithmetic

Sanja Kastratovic

2020

View PDFchevron_right

Processing Encrypted Data Using Homomorphic Encryption

Louis Goubin

2017

View PDFchevron_right

State Of Art in Homomorphic Encryption Schemes

sobitha ahila

2014

View PDFchevron_right

Towards Using Homomorphic Encryption for Cryptographic Access Control in Outsourced Data Processing

Stefan Rass

2016

View PDFchevron_right

Towards Secure Distributed Computations

Felipe Zipitria, Gustavo Betarte

View PDFchevron_right

Blind Turing-Machines: Arbitrary Private Computations from Group Homomorphic Encryption

Stefan Rass

International Journal of Advanced Computer Science and Applications, 2013

View PDFchevron_right

Delegatable homomorphic encryption with applications to secure outsourcing of computation

Manuel Barbosa

2012

View PDFchevron_right

F1: A Fast and Programmable Accelerator for Fully Homomorphic Encryption

Karim Eldefrawy

MICRO-54: 54th Annual IEEE/ACM International Symposium on Microarchitecture, 2021

View PDFchevron_right

MAGE: Nearly Zero-Cost Virtual Memory for Secure Computation

sam kumar

2021

View PDFchevron_right