Roman Walch
YOU?
Author Swipe
View article: Monolith: Circuit-Friendly Hash Functions with New Nonlinear Layers for Fast and Constant-Time Implementations
Monolith: Circuit-Friendly Hash Functions with New Nonlinear Layers for Fast and Constant-Time Implementations Open
Hash functions are a crucial component in incrementally verifiable computation (IVC) protocols and applications. Among those, recursive SNARKs and folding schemes require hash functions to be both fast in native CPU computations and compac…
View article: Hiding Your Awful Online Choices Made More Efficient and Secure: A New Privacy-Aware Recommender System
Hiding Your Awful Online Choices Made More Efficient and Secure: A New Privacy-Aware Recommender System Open
Recommender systems are an integral part of online platforms that recommend new content to users with similar interests. However, they demand a considerable amount of user activity data where, if the data is not adequately protected, const…
View article: Large-Scale MPC: Scaling Private Iris Code Uniqueness Checks to Millions of Users
Large-Scale MPC: Scaling Private Iris Code Uniqueness Checks to Millions of Users Open
In this work we tackle privacy concerns in biometric verification systems that typically require server-side processing of sensitive data (e.g., fingerprints and Iris Codes). Concretely, we design a solution that allows us to query whether…
View article: Pasta: A Case for Hybrid Homomorphic Encryption
Pasta: A Case for Hybrid Homomorphic Encryption Open
The idea of hybrid homomorphic encryption (HHE) is to drastically reduce bandwidth requirements when using homomorphic encryption (HE) at the cost of more expensive computations in the encrypted domain. To this end, various dedicated schem…
View article: Reinforced Concrete
Reinforced Concrete Open
\n Contains fulltext :\n 287472.pdf (Publisher’s version ) (Open Access)\n
View article: Privately Connecting Mobility to Infectious Diseases via Applied Cryptography
Privately Connecting Mobility to Infectious Diseases via Applied Cryptography Open
Recent work has shown that cell phone mobility data has the unique potential to create accurate models for human mobility and consequently the spread of infected diseases [74]. While prior studies have exclusively relied on a mobile networ…
View article: CryptoTL: Private, Efficient and Secure Transfer Learning
CryptoTL: Private, Efficient and Secure Transfer Learning Open
Big data has been a pervasive catchphrase in recent years, but dealing with data scarcity has become a crucial question for many real-world deep learning (DL) applications. A popular methodology to efficiently enable the training of DL mod…
View article: Privately Connecting Mobility to Infectious Diseases via Applied Cryptography
Privately Connecting Mobility to Infectious Diseases via Applied Cryptography Open
Recent work has shown that cell phone mobility data has the unique potential to create accurate models for human mobility and consequently the spread of infected diseases. While prior studies have exclusively relied on a mobile network ope…
View article: Efficient FPGA Implementations of LowMC and Picnic
Efficient FPGA Implementations of LowMC and Picnic Open
Post-quantum cryptography has received increased attention in recent years, in particular, due to the standardization effort by NIST. One of the second-round candidates in the NIST post-quantum standardization project is Picnic, a post-qua…