搜索结果: 1-11 共查到“军队指挥学 throughput”相关记录11条 . 查询时间(0.046 秒)
nGraph-HE2: A High-Throughput Framework for Neural Network Inference on Encrypted Data
Privacy-Preserving Machine Learning Deep Learning Graph Compilers
2019/8/21
In previous work, Boemer et al. introduced nGraph-HE, an extension to the Intel nGraph deep learning (DL) compiler, that en- ables data scientists to deploy models with popular frameworks such as Tens...
ASTRA: High Throughput 3PC over Rings with Application to Secure Prediction
Secure Computation Machine Learning 3PC
2019/4/28
The concrete efficiency of secure computation has been the focus of many recent works. In this work, we present protocols for secure 33-party computation (3PC) tolerating one corruption in the offline...
Parallel Chains: Improving Throughput and Latency of Blockchain Protocols via Parallel Composition
Bitcoin blockchain parallel composition
2018/11/21
Two of the most significant challenges in the design of blockchain protocols is increasing their transaction processing throughput and minimising latency in terms of transaction settlement. In this wo...
VeritasDB: High Throughput Key-Value Store with Integrity
key-value store guarantees data integrity
2018/3/8
While businesses shift their databases to the cloud, they continue to depend on them to operate correctly. Alarmingly, cloud services constantly face threats from exploits in the privileged computing ...
High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority
secure multiparty computation honest majority concrete efficiency
2016/12/10
In this paper, we describe a new information-theoretic protocol (and a computationally-secure variant) for secure {\em three}-party computation with an honest majority. The protocol has very minimal c...
High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest Majority
secure multiparty computation malicious adversaries honest majority
2016/12/8
In this paper, we describe a new protocol for secure three-party computation of any functionality, with an honest majority and a \textit{malicious} adversary. Our protocol has both an information-theo...
High throughput in slices: the case of PRESENT, PRINCE and KATAN64 ciphers
PRESENT PRINCE KATAN64
2016/12/8
This paper presents high-throughput assembly implementations of PRESENT,
PRINCE and KATAN64 ciphers for the ATtiny family of AVR microcontrollers. We report
new throughput records, achieving the spe...
A High Throughput/Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths --- Toward Efficient CBC-Mode Implementation
AES hardware architectures unified encryption/decryption processors
2016/6/8
This paper proposes a highly efficient AES hardware architecture that supports both encryption and decryption for the CBC mode. Some conventional AES architectures employ pipelining techniques to enha...
Improving throughput of RC4 algorithm using multithreading techniques in multicore processors
Throughput of RC4 Multithreading in Encryption
2016/1/25
RC4 is the most widely used stream cipher around. So, it is important that it runs cost effectively, with minimum encryption time. In other words, it should give higher throughput. In this paper, a me...
S-box pipelining using genetic algorithms for high-throughput AES implementations: How fast can we go?
Real-time cryptography Genetic Algorithms (GAs) S-boxes
2016/1/7
In the last few years, several practitioners have proposed a
wide range of approaches for reducing the implementation area of the
AES in hardware. However, an area-throughput trade-off that undermin...
Abstract.In this paper, we propose a high-throughput pipeline architecture of the stream cipher ZUC which has been included in the security portfolio of 3GPP LTE-Advanced. In the literature, the schem...