Charles Gouert

Orcid: 0000-0002-7670-830X

According to our database1, Charles Gouert authored at least 25 papers between 2019 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Hardware-Accelerated Encrypted Execution of General-Purpose Applications.
Proc. Priv. Enhancing Technol., 2025

2024
Juliet: A Configurable Processor for Computing on Encrypted Data.
IEEE Trans. Computers, September, 2024

MatcHEd: Privacy-Preserving Set Similarity based on MinHash.
IACR Cryptol. ePrint Arch., 2024

HElix: Genome Similarity Detection in the Encrypted Domain.
IACR Cryptol. ePrint Arch., 2024

Ripple: Accelerating Programmable Bootstraps for FHE with Wavelet Approximations.
IACR Cryptol. ePrint Arch., 2024

PolyFHEmus: Rethinking Multiplication in Fully Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2024

Data Privacy Made Easy: Enhancing Applications with Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2024

PEEV: Parse Encrypt Execute Verify - A Verifiable FHE Framework.
IEEE Access, 2024

2023
SoK: New Insights into Fully Homomorphic Encryption Libraries via Standardized Benchmarks.
Proc. Priv. Enhancing Technol., July, 2023

MPloC: Privacy-Preserving IP Verification using Logic Locking and Secure Multiparty Computation.
IACR Cryptol. ePrint Arch., 2023

HELM: Navigating Homomorphic Encryption through Gates and Lookup Tables.
IACR Cryptol. ePrint Arch., 2023

Accelerated Encrypted Execution of General-Purpose Applications.
IACR Cryptol. ePrint Arch., 2023

ArctyrEX : Accelerated Encrypted Execution of General-Purpose Applications.
CoRR, 2023

REDsec: Running Encrypted Discretized Neural Networks in Seconds.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

$\text{MP}\ell\circ \mathrm{C}$: Privacy-Preserving IP Verification Using Logic Locking and Secure Multiparty Computation.
Proceedings of the 29th International Symposium on On-Line Testing and Robust System Design, 2023

FHE-Booster: Accelerating Fully Homomorphic Execution with Fine-tuned Bootstrapping Scheduling.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2023

2022
Privacy-Preserving IP Verification.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2022

Dirty Metadata: Understanding A Threat to Online Privacy.
IEEE Secur. Priv., 2022

zk-Sherlock: Exposing Hardware Trojans in Zero-Knowledge.
IACR Cryptol. ePrint Arch., 2022

Romeo: Conversion and Evaluation of HDL Designs in the Encrypted Domain.
IACR Cryptol. ePrint Arch., 2022

New Insights into Fully Homomorphic Encryption Libraries via Standardized Benchmarks.
IACR Cryptol. ePrint Arch., 2022

Optimizing Homomorphic Encryption Parameters for Arbitrary Applications.
IACR Cryptol. ePrint Arch., 2022

2021
REDsec: Running Encrypted DNNs in Seconds.
IACR Cryptol. ePrint Arch., 2021

2020
Peak Your Frequency: Advanced Search of 3D CAD Files in the Fourier Domain.
IEEE Access, 2020

2019
Covert Data Exfiltration Using Light and Power Channels.
Proceedings of the 37th IEEE International Conference on Computer Design, 2019


  Loading...