共 48 条
[1]
Deep Learning with Differential Privacy
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:308-318
[2]
Al Badawi A, 2019, Arxiv, DOI arXiv:1908.06972
[3]
Albrecht M. R., 2019, IACR Cryptol. ePrint Arch, V2019, P939
[5]
[Anonymous], 2007, POWER ANAL ATTACKS R
[6]
[Anonymous], 2023, Microsoft SEAL (release 4.1)
[7]
Barker E, 2016, Recommendation for Key Management, Part 1: General., DOI [DOI 10.6028/NIST.SP.800-57PT1R4, 10.6028/NIST.SP.800-57pt1r4., https://doi.org/10.6028/NIST.SP.800-57pt1r4]
[8]
Brakerski Zvika, 2014, ACM Transactions on Computation Theory, V6, DOI 10.1145/2633600
[9]
Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2012,
2012, 7417
:868-886
[10]
Bursztein E., 2023, Generic attacks against cryptographic hardware through long-range deep learning