Cryptography

Privacy-Aware RAG: Secure and Isolated Knowledge Retrieval

Authors: Pengcheng Zhou, Yinglun Feng, Zhongliang Yang | Published: 2025-03-17
RAG
Poisoning attack on RAG
Cryptography

The Beginner’s Textbook for Fully Homomorphic Encryption

Authors: Ronny Ko | Published: 2025-03-07 | Updated: 2025-05-20
Polynomial Approximation
Mathematical Analysis
Cryptography

Trusted Machine Learning Models Unlock Private Inference for Problems Currently Infeasible with Cryptography

Authors: Ilia Shumailov, Daniel Ramage, Sarah Meiklejohn, Peter Kairouz, Florian Hartmann, Borja Balle, Eugene Bagdasarian | Published: 2025-01-15
Trusted Capable Model Environments
Privacy Protection
Cryptography

Resilient Endurance-Aware NVM-based PUF against Learning-based Attacks

Authors: Hassan Nassar, Ming-Liang Wei, Chia-Lin Yang, Jörg Henkel, Kuan-Hsun Chen | Published: 2025-01-10
Cybersecurity
Cryptography
Durability Issue

TAPFed: Threshold Secure Aggregation for Privacy-Preserving Federated Learning

Authors: Runhua Xu, Bo Li, Chao Li, James B. D. Joshi, Shuai Ma, Jianxin Li | Published: 2025-01-09
Privacy Protection
Framework
Cryptography

Leveraging a Randomized Key Matrix to Enhance the Security of Symmetric Substitution Ciphers

Authors: Shubham Gandhi, Om Khare, Mihika Dravid, Mihika Sanghvi, Sunil Mane, Aadesh Gajaralwar, Saloni Gandhi | Published: 2023-11-29
Watermarking
Cryptography
Cryptography

Secure and Verifiable Data Collaboration with Low-Cost Zero-Knowledge Proofs

Authors: Yizheng Zhu, Yuncheng Wu, Zhaojing Luo, Beng Chin Ooi, Xiaokui Xiao | Published: 2023-11-26
Privacy Protection
Multi-Party Computation
Cryptography

SCAR: Power Side-Channel Analysis at RTL-Level

Authors: Amisha Srivastava, Sanjay Das, Navnil Choudhury, Rafail Psiakis, Pedro Henrique Silva, Debjit Pal, Kanad Basu | Published: 2023-10-10
Prompt Injection
Cryptography
Vulnerability Prediction

Labeling without Seeing? Blind Annotation for Privacy-Preserving Entity Resolution

Authors: Yixiang Yao, Weizhao Jin, Srivatsan Ravi | Published: 2023-08-07
Watermarking
Data Protection Method
Cryptography

Cryptographic ransomware encryption detection: Survey

Authors: Kenan Begovic, Abdulaziz Al-Ali, Qutaibah Malluhi | Published: 2023-06-21
API Monitoring Method
Malware Detection
Cryptography