Encryption Technology

Efficient Softmax Reformulation for Homomorphic Encryption via Moment Generating Function

Authors: Hanjun Park, Byeong-Seo Min, Jiheon Woo, Min-Wook Jeong, Jongho Shin, Yongwoo Lee, Young-Sik Kim, Yongjune Kim | Published: 2026-02-02
Algorithm Design
Encryption Technology
評価基準

Towards Zero Rotation and Beyond: Architecting Neural Networks for Fast Secure Inference with Homomorphic Encryption

Authors: Yifei Cai, Yizhou Feng, Qiao Zhang, Chunsheng Xin, Hongyi Wu | Published: 2026-01-29
Algorithm Design
Trigger Detection
Encryption Technology

Design and Optimization of Cloud Native Homomorphic Encryption Workflows for Privacy-Preserving ML Inference

Authors: Tejaswini Bollikonda | Published: 2025-10-28
Privacy Protection
Encryption Technology
暗号化環境でのデータ処理

HHEML: Hybrid Homomorphic Encryption for Privacy-Preserving Machine Learning on Edge

Authors: Yu Hin Chan, Hao Yang, Shiyu Shen, Xingyu Fan, Shengzhe Lyu, Patrick S. Y. Hung, Ray C. C. Cheung | Published: 2025-10-23
Privacy-Preserving Machine Learning
暗号化アルゴリズム
Encryption Technology

Exploiting the Potential of Linearity in Automatic Differentiation and Computational Cryptography

Authors: Giulia Giusti | Published: 2025-10-20
Encryption Technology
Watermark Design
Quantum Computing Method

CryptOracle: A Modular Framework to Characterize Fully Homomorphic Encryption

Authors: Cory Brynds, Parker McLeod, Lauren Caccamise, Asmita Pal, Dewan Saiham, Sazadur Rahman, Joshua San Miguel, Di Wu | Published: 2025-10-03 | Updated: 2025-10-13
Energy-Based Model
Encryption Technology
Statistical Analysis

Understanding the Error Sensitivity of Privacy-Aware Computing

Authors: Matías Mazzanti, Esteban Mocskos, Augusto Vega, Pradip Bose | Published: 2025-06-09
Error Correction Code
Privacy Protection Mechanism
Encryption Technology

Secure Distributed Learning for CAVs: Defending Against Gradient Leakage with Leveled Homomorphic Encryption

Authors: Muhammad Ali Najjar, Ren-Yi Huang, Dumindu Samaraweera, Prashant Shekhar | Published: 2025-06-09
Privacy Protection Mechanism
Encryption Technology
Federated Learning

Private Transformer Inference in MLaaS: A Survey

Authors: Yang Li, Xinyu Zhou, Yitong Wang, Liangxin Qian, Jun Zhao | Published: 2025-05-15
Encryption Technology
Machine Learning
Computational Consistency

Encryption and Real Time Decryption for protecting Machine Learning models in Android Applications

Authors: Aryan Verma | Published: 2021-09-06
Algorithm
Model Protection Methods
Encryption Technology