共 48 条
- [1] Deep Learning with Differential Privacy [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 308 - 318
- [2] Al Badawi A, 2019, Arxiv, DOI arXiv:1908.06972
- [3] Albrecht M.R., 2019, Tech. Paper 2019/939, P939
- [5] [Anonymous], 2023, Microsoft SEAL (release 4.1)
- [6] Barker E, 2016, Recommendation for Key Management, Part 1: General., DOI [DOI 10.6028/NIST.SP.800-57PT1R4, 10.6028/NIST.SP.800-57pt1r4., 10.6028/NIST.SP.800-57pt1r4]
- [7] Brakerski Zvika, 2014, ACM Transactions on Computation Theory, V6, DOI 10.1145/2633600
- [8] Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2012, 2012, 7417 : 868 - 886
- [9] Bursztein E., 2023, Generic attacks against cryptographic hardware through long-range deep learning
- [10] Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures Profiling Attacks Without Pre-processing [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2017, 2017, 10529 : 45 - 68