Sok: New insights into fully homomorphic encryption libraries via standardized benchmarks C Gouert, D Mouris, N Tsoutsos Proceedings on privacy enhancing technologies, 2023 | 20 | 2023 |
REDsec: Running encrypted discretized neural networks in seconds L Folkerts, C Gouert, NG Tsoutsos Cryptology ePrint Archive, 2021 | 13 | 2021 |
Romeo: conversion and evaluation of hdl designs in the encrypted domain C Gouert, NG Tsoutsos 2020 57th ACM/IEEE Design Automation Conference (DAC), 1-6, 2020 | 11 | 2020 |
REDsec: Running Encrypted DNNs in Seconds. L Folkerts, C Gouert, NG Tsoutsos IACR Cryptol. ePrint Arch. 2021, 1100, 2021 | 9 | 2021 |
Privacy-preserving ip verification D Mouris, C Gouert, NG Tsoutsos IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2021 | 5 | 2021 |
Covert data exfiltration using light and power channels P Cronin, C Gouert, D Mouris, NG Tsoutsos, C Yang 2019 IEEE 37th International Conference on Computer Design (ICCD), 301-304, 2019 | 5 | 2019 |
Optimizing homomorphic encryption parameters for arbitrary applications C Gouert, R Khan, NG Tsoutsos Cryptology ePrint Archive, 2022 | 4 | 2022 |
Peak your frequency: advanced search of 3D CAD files in the Fourier domain D Mouris, C Gouert, N Gupta, NG Tsoutsos IEEE Access 8, 141481-141496, 2020 | 4 | 2020 |
HELM: Navigating Homomorphic Encryption through Gates and Lookup Tables C Gouert, D Mouris, NG Tsoutsos Cryptology ePrint Archive, 2023 | 3 | 2023 |
Zk-sherlock: Exposing hardware trojans in zero-knowledge D Mouris, C Gouert, NG Tsoutsos 2022 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 170-175, 2022 | 3 | 2022 |
Dirty metadata: understanding a threat to online privacy C Gouert, NG Tsoutsos IEEE Security & Privacy 20 (6), 27-34, 2022 | 3 | 2022 |
Accelerated Encrypted Execution of General-Purpose Applications. C Gouert, V Joseph, S Dalton, C Augonnet, M Garland, NG Tsoutsos IACR Cryptol. ePrint Arch. 2023, 641, 2023 | 2 | 2023 |
ArctyrEX: Accelerated Encrypted Execution of General-Purpose Applications C Gouert, V Joseph, S Dalton, C Augonnet, M Garland, NG Tsoutsos arXiv preprint arXiv:2306.11006, 2023 | 1 | 2023 |
FHE-Booster: Accelerating fully homomorphic execution with fine-tuned bootstrapping scheduling T White, C Gouert, C Yang, NG Tsoutsos 2023 IEEE International Symposium on Hardware Oriented Security and Trust …, 2023 | 1 | 2023 |
Data Privacy Made Easy: Enhancing Applications with Homomorphic Encryption C Gouert, NG Tsoutsos Cryptology ePrint Archive, 2024 | | 2024 |
: Privacy-Preserving IP Verification Using Logic Locking and Secure Multiparty Computation D Mouris, C Gouert, NG Tsoutsos 2023 IEEE 29th International Symposium on On-Line Testing and Robust System …, 2023 | | 2023 |
MatcHEd: Privacy-Preserving Set Similarity based on MinHash R Shokri, C Gouert, NG Tsoutsos | | 2023 |
MPloC: Privacy-Preserving IP Verification using Logic Locking and Secure Multiparty Computation. D Mouris, C Gouert, NG Tsoutsos IACR Cryptol. ePrint Arch. 2023, 511, 2023 | | 2023 |
PEEV: Parse Encrypt Execute Verify-A Verifiable FHE Framework O Ahmed, C Gouert, NG Tsoutsos | | |