Nir Drucker

Orcid: 0000-0002-7273-4797

According to our database1, Nir Drucker authored at least 41 papers between 2016 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
BLEACH: Cleaning Errors in Discrete Computations Over CKKS.
J. Cryptol., March, 2024

Power-Softmax: Towards Secure LLM Inference over Encrypted Data.
CoRR, 2024

Converting Transformers to Polynomial Form for Secure Inference Over Homomorphic Encryption.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

2023
HeLayers: A Tile Tensors Framework for Large Neural Networks on Encrypted Data.
Proc. Priv. Enhancing Technol., January, 2023

E2E near-standard and practical authenticated transciphering.
IACR Cryptol. ePrint Arch., 2023

Privacy-Preserving Federated Learning over Vertically and Horizontally Partitioned Data for Financial Anomaly Detection.
CoRR, 2023

Sensitive Tuning of Large Scale CNNs for E2E Secure Prediction using Homomorphic Encryption.
CoRR, 2023

Efficient Pruning for Machine Learning Under Homomorphic Encryption.
Proceedings of the Computer Security - ESORICS 2023, 2023

Efficient Skip Connections Realization for Secure Inference on Encrypted Data.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023

Generating One-Hot Maps Under Encryption.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023

Tutorial-HEPack4ML '23: Advanced HE Packing Methods with Applications to ML.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Poster: Efficient AES-GCM Decryption Under Homomorphic Encryption.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Complex Encoded Tile Tensors: Accelerating Encrypted Analytics.
IEEE Secur. Priv., 2022

Timing leakage analysis of non-constant-time NTT implementations with Harvey butterflies.
IACR Cryptol. ePrint Arch., 2022

HE-PEx: Efficient Machine Learning under Homomorphic Encryption using Pruning, Permutation and Expansion.
CoRR, 2022

A Methodology for Training Homomorphic Encryption Friendly Neural Networks.
Proceedings of the Applied Cryptography and Network Security Workshops, 2022

Privacy-Preserving Record Linkage Using Local Sensitive Hash and Private Set Intersection.
Proceedings of the Applied Cryptography and Network Security Workshops, 2022

2021
Selfie: reflections on TLS 1.3 with PSK.
J. Cryptol., 2021

On the applicability of the Fujisaki-Okamoto transformation to the BIKE KEM.
Int. J. Comput. Math. Comput. Syst. Theory, 2021

Binding BIKE errors to a key pair.
IACR Cryptol. ePrint Arch., 2021

NTT software optimization using an extended Harvey butterfly.
IACR Cryptol. ePrint Arch., 2021

2020
Fast polynomial inversion for post quantum QC-MDPC cryptography.
IACR Cryptol. ePrint Arch., 2020

Speed up over the Rainbow.
IACR Cryptol. ePrint Arch., 2020

On Constant-Time QC-MDPC Decoders with Negligible Failure Rate.
Proceedings of the Code-Based Cryptography - 8th International Workshop, 2020

2019
Cyclic-routing of Unmanned Aerial Vehicles.
J. Comput. Syst. Sci., 2019

A toolbox for software optimization of QC-MDPC code-based cryptosystems.
J. Cryptogr. Eng., 2019

QC-MDPC decoders with several shades of gray.
IACR Cryptol. ePrint Arch., 2019

On constant-time QC-MDPC decoding with negligible failure rate.
IACR Cryptol. ePrint Arch., 2019

Continuous Key Agreement with Reduced Bandwidth.
IACR Cryptol. ePrint Arch., 2019

Generating a Random String with a Fixed Weight.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2019

Fast constant time implementations of ZUC-256 on x86 CPUs.
Proceedings of the 16th IEEE Annual Consumer Communications & Networking Conference, 2019

2018
Achieving trustworthy Homomorphic Encryption by combining it with a Trusted Execution Environment.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018

Making AES great again: the forthcoming vectorized AES instruction.
IACR Cryptol. ePrint Arch., 2018

Fast modular squaring with AVX512IFMA.
IACR Cryptol. ePrint Arch., 2018

Cryptosystems with a multi prime composite modulus.
Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference, 2018

The Comeback of Reed Solomon Codes.
Proceedings of the 25th IEEE Symposium on Computer Arithmetic, 2018

Fast multiplication of binary polynomials with the forthcoming vectorized VPCLMULQDQ instruction.
Proceedings of the 25th IEEE Symposium on Computer Arithmetic, 2018

2017
Faster Secure Cloud Computations with a Trusted Proxy.
IEEE Secur. Priv., 2017

Combining Homomorphic Encryption with Trusted Execution Environment: A Demonstration with Paillier Encryption and SGX.
Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30, 2017

Paillier-encrypted databases with fast aggregated queries.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

2016
Cyclic Routing of Unmanned Aerial Vehicles.
Proceedings of the Integration of AI and OR Techniques in Constraint Programming, 2016


  Loading...