Does Fully Homomorphic Encryption Need Compute Acceleration? Authors: Leo de Castro, Rashmi Agrawal, Rabia Yazicigil, Anantha Chandrakasan, Vinod Vaikuntanathan, Chiraag Juvekar, Ajay Joshi | Published: 2021-12-13 | Updated: 2021-12-14 Algorithm DesignMemory Management MethodCommunication Efficiency 2021.12.13 2025.05.28 Literature Database
PhishMatch: A Layered Approach for Effective Detection of Phishing URLs Authors: Harshal Tupsamudre, Sparsh Jain, Sachin Lodha | Published: 2021-12-04 Phishing DetectionMemory Management MethodUser Behavior Analysis 2021.12.04 2025.05.28 Literature Database
LAORAM: A Look Ahead ORAM Architecture for Training Large Embedding Tables Authors: Rachit Rajat, Yongqin Wang, Murali Annavaram | Published: 2021-07-16 | Updated: 2022-06-30 Privacy Protection MechanismMemory Management MethodMembership Inference 2021.07.16 2025.05.28 Literature Database
QUAC-TRNG: High-Throughput True Random Number Generation Using Quadruple Row Activation in Commodity DRAM Chips Authors: Ataberk Olgun, Minesh Patel, A. Giray Yağlıkçı, Haocong Luo, Jeremie S. Kim, Nisa Bostancı, Nandita Vijaykumar, Oğuz Ergin, Onur Mutlu | Published: 2021-05-19 | Updated: 2021-05-25 Data Management SystemPerformance EvaluationMemory Management Method 2021.05.19 2025.05.28 Literature Database
Plinius: Secure and Persistent Machine Learning Model Training Authors: Peterson Yuhala, Pascal Felber, Valerio Schiavoni, Alain Tchana | Published: 2021-04-07 | Updated: 2021-04-08 Privacy ProtectionMemory Management MethodModel Design 2021.04.07 2025.05.28 Literature Database