Academic literature on the topic 'Tfhe'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Tfhe.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Tfhe"
Okada, Hiroki, Shinsaku Kiyomoto, and Carlos Cid. "Integer-Wise Functional Bootstrapping on TFHE: Applications in Secure Integer Arithmetics." Information 12, no. 8 (July 26, 2021): 297. http://dx.doi.org/10.3390/info12080297.
Full textChillotti, Ilaria, Nicolas Gama, Mariya Georgieva, and Malika Izabachène. "TFHE: Fast Fully Homomorphic Encryption Over the Torus." Journal of Cryptology 33, no. 1 (April 25, 2019): 34–91. http://dx.doi.org/10.1007/s00145-019-09319-x.
Full textXu, Ying, Hongmei Xu, Yu Zhen, Xueting Sang, Hao Wu, Cong Hu, Zhanchuan Ma, Miaomiao Yu, and Huanfa Yi. "Imbalance of Circulatory T Follicular Helper and T Follicular Regulatory Cells in Patients with ANCA-Associated Vasculitis." Mediators of Inflammation 2019 (December 2, 2019): 1–9. http://dx.doi.org/10.1155/2019/8421479.
Full textB., Paulin Boale, Simon Ntumba B., and Eugene Mbuyi M. "Performance of Adder Architectures on Encrypted Integers." International Journal of Engineering and Advanced Technology 10, no. 6 (August 30, 2021): 216–21. http://dx.doi.org/10.35940/ijeat.f3083.0810621.
Full textMoon, Subin, and Younho Lee. "An Efficient Encrypted Floating-Point Representation Using HEAAN and TFHE." Security and Communication Networks 2020 (March 2, 2020): 1–18. http://dx.doi.org/10.1155/2020/1250295.
Full textPaul, Jestine, Benjamin Hong Meng Tan, Bharadwaj Veeravalli, and Khin Mi Mi Aung. "Non-Interactive Decision Trees and Applications with Multi-Bit TFHE." Algorithms 15, no. 9 (September 18, 2022): 333. http://dx.doi.org/10.3390/a15090333.
Full textSu, R., Y. Y. Wang, F. Y. Hu, X. Zheng, Y. Liu, X. Li, and C. Wang. "AB0043 THE IMBALANCE OF T FOLLICULAR REGULATORY CELL AND T FOLLICULAR HELPER CELL IN RHEUMATOID ARTHRITIS." Annals of the Rheumatic Diseases 79, Suppl 1 (June 2020): 1324–25. http://dx.doi.org/10.1136/annrheumdis-2020-eular.1311.
Full textFan, Cunqun, Peiheng Jia, Manyun Lin, Lan Wei, Peng Guo, Xiangang Zhao, and Ximeng Liu. "Cloud-Assisted Private Set Intersection via Multi-Key Fully Homomorphic Encryption." Mathematics 11, no. 8 (April 8, 2023): 1784. http://dx.doi.org/10.3390/math11081784.
Full textAbe, S., H. Tsuboi, H. Toko, F. Honda, A. Koido, H. Miki, H. Asashima, Y. Kondo, and I. Matsumoto. "POS0810 T FOLLICULAR HELPER CELLS IN BLOOD MIRROR SALIVARY GLAND-INFILTRATING T CELLS IN PRIMARY SJÖGREN’S SYNDROME." Annals of the Rheumatic Diseases 82, Suppl 1 (May 30, 2023): 699.1–700. http://dx.doi.org/10.1136/annrheumdis-2023-eular.2906.
Full textAziz, Md Momin Al, Md Toufique Morshed Tamal, and Noman Mohammed. "Secure Genomic String Search with Parallel Homomorphic Encryption." Information 15, no. 1 (January 11, 2024): 40. http://dx.doi.org/10.3390/info15010040.
Full textDissertations / Theses on the topic "Tfhe"
Clet, Pierre-Emmanuel. "Contributions to the optimization of TFHE's functional bootstrapping for the evaluation of non-polynomial operators." Electronic Thesis or Diss., université Paris-Saclay, 2024. http://www.theses.fr/2024UPASG001.
Full textIn recent years, concerns about sensitive and personal data arose due to the increasing creation and use of digital data. New laws, such as the General Data Protection Regulation, have been introduced to ensure that the confidentiality of individuals' data is respected. However, the growing outsourcing of data processing, particularly with the emergence of "machine learning as a service", raises the following question: is it possible to let a third party process our data while keeping it confidential?One solution to this problem comes in the form of Fully Homomorphic Encryption, or FHE for short. Using FHE cryptosystems, operations can be applied directly to encrypted messages, without ever revealing either the original message or the message resulting from the operations. In theory, this collection of techniques makes it possible to externalise calculations without compromising on the confidentiality of the data used during these calculations.This could pave the way for numerous applications, such as the possibility of offering online medical diagnostic services while ensuring the total confidentiality of the patients' medical data.Despite this promise, the high computational cost of FHE operators limits their practical scope. A calculation on encrypted data can take several million times longer than its equivalent on non-encrypted data. This makes it unthinkable to evaluate highly time consuming algorithms on encrypted data. In addition, the memory cost of FHE encryption is several thousand times greater than unencrypted data. This overhead may prove to be prohibitive for applications on low-memory systems such as embedded systems.In this thesis we develop a new primitive for computing on encrypted data based on the "functional bootstrapping" operation supported by the TFHE cryptosystem. This primitive allows a gain in latency and memory compared to other comparable techniques in the state of the art. We are also introducing a second primitive enabling calculations to be performed in the form of a logic circuit, providing a significant gain in calculation speed compared with the state of the art. This approach could be of particular interest to designers of homomorphic compilers as an alternative to the use of binary encryption.These two tools are intended to be sufficiently generic to be applicable to a wide range of use cases and are therefore not limited to the use cases presented in this manuscript.As an illustration, we apply our operators to the confidential computation of outsourced neural networks, thus demonstrating the possibility of evaluating neural networks with relatively low latency, even in the case of recurrent neural networks.Finally, we apply our operators to a technique known as transciphering, making it possible to overcome memory limitation on the client side coming with the large size of FHE ciphertexts
Tap, Samuel. "Construction de nouveaux outils de chiffrement homomorphe efficace." Electronic Thesis or Diss., Université de Rennes (2023-....), 2023. http://www.theses.fr/2023URENS103.
Full textIn our everyday life, we leave a trail of data whenever we access online services. Some are given voluntarily and others reluctantly. Those data are collected and analyzed in the clear which leads to major threats on the user's privacy and prevents collaborations between entities working on sensitive data. In this context, Fully Homomorphic Encryption brings a new hope by enabling computation over encrypted data, which removes the need to access data in the clear to analyze and exploit it. This thesis focuses on TFHE, a recent fully homomorphic encryption scheme able to compute a bootstrapping in record time. We introduce an optimization framework to set the degrees of freedom inherent to homomorphic computations which gives non-experts the ability to use it (more) easily. We describe a plethora of new FHE algorithms which improve significantly the state of the art and limit, (if not remove) existing restrictions. Efficient open source implementations are already accessible
Kozak, Malgorzata. "Le contrat d'agence commerciale et l'article 101 TFUE." Toulouse 1, 2011. http://www.theses.fr/2011TOU10036.
Full textDistribution systems have become more and more complex and tend to use different legal figures to fulfill the producer's aims. One of them can be agency. From the perspective of competition law, agency holds a special status, resulting from the fact that the agent is present in two distinct relevant markets, in one representing this principal in the conclusion of a contract and in a second offering his services as an agent. This causes some practical difficulties and is interesting from theoritical point of view. The erroneous qualification of a distributor as an agent could result in fines imposed by competition authorities. However, as to the first market described above, according to an interpretation of article 101 TFEU, an anticompetitive agreement cannot be concluded between the same person which can lead to the agency being immune from the competition law requirements. It is imperative to recognize the difference, and therefore, the criteria of an application of article 101 TFEU to an agency have been indicated by the European Commission since 1962 and by the case law of the Court of Justice of the European Union. Nevertheless, the enigma is far from being resolved since the proposed solutions tend to be incoherent. One of them concentrates on the single economic entity doctrine. Other solutions refer to an auxiliary theory whereby. The most recent solution focuses on risks undertaken by an agent in relation to the contracts that he negotiated. The carried out analysis and solutions reached show that some other elements must be taken into account in assessing whether an agency relationship exists including an assessment of the effects of an agreement
Hardtke, Svenja. "Charakterisierung von murinen CXCR5 positiven TFH-Zellen." [S.l.] : [s.n.], 2006. http://deposit.ddb.de/cgi-bin/dokserv?idn=979861195.
Full textMary, Romain. "Améliorer les effets anti-tumoraux des lymphocytes T folliculaires helper (Tfh) en ciblant la communication intercellulaire entre Tfh et Th2." Thesis, Bourgogne Franche-Comté, 2019. http://www.theses.fr/2019UBFCI009/document.
Full textIt is now accepted that the immune system plays a critical role in cancers evolution (Hanahan et al., 2011). In this context, current understanding of the adaptive immune response made it a prime target. T CD4 cells, the main players of the adaptive immune system component, are known to possess distinct roles in the control of tumour growth. Thereby, Th2 and Tfh cells, both known to activate B cells in pathogenic infections, present antagonistic roles in cancer. Indeed, numerous studies demonstrate that Th2 cells are correlated with disease progression (especially via IL-4 secretion) (Koller et al., 2010 ; Roca et al., 2012), whereas Tfh cells are associated with a good prognosis for the patients (Gu-Trantien et al., 2013, 2017) despite the actual limited amount of available data.Our current researches highlighted a new property of the biology of Tfh cells. We found that Tfh cells are able to express the Hemathopoietic Prostaglandin D2 synthase (HPGDS), an eicosanoid pathway enzyme involved in Prostaglandin D2 (PGD2) production. Moreover, different studies revealed that Th2 cells expressed CRTH2, the specific PGD2 receptor. PGD2 is known as a chemoattractant molecule for Th2 cells and lead to the increase of their cytokine secretion. We hypothesized that Tfh communicate with Th2 cells via PGD2 signalling. The present project is focused on the understanding of the underlying molecular and cellular mechanisms involved in this cross-talk and their impact in cancer. The last aim of this work is to favor the development of PGD2 as a new cancer therapeutic target
Li, Dian. "Solvolysis at secondary and tertiary carbon centres in 50% TFE." Thesis, University of Sheffield, 2017. http://etheses.whiterose.ac.uk/17883/.
Full textForcade, Edouard. "Immunobiologie de la GVH chronique humain : dérégulation de la réaction du centre germinatif et implication de la réponse Th17." Thesis, Bordeaux, 2016. http://www.theses.fr/2016BORD0439/document.
Full textChronic GVHD (cGVHD) remains a major complication of allogeneic stem cell transplantation and its pathogenesis poorly understood. Previous reports established the role of T cells and B cells during cGVHD, but the quality of their interaction and T cell subsets involved remain to be defined. T cell – B cell crosstalk occurs in the germinal center generating memory B cells and high affinity antibody secreting cells consecutively to signals provided by T follicular helper cells (TFH) which are tightly controlled by a regulatory subset (TFR). The opportunity to interrogate events occurring in the germinal center through the analysis of their circulating contingent (c), allowed us to better understand cGVHD pathogenesis. cTFH phenotypic signature suggest an enhanced function during cGVHD, confirmed in functional studies, and correlating with observed B cell phenotype. In addition, regulatory mechanisms appeared defective during cGVHD, as cTFR showed a numerical deficiency, explained by a defect in resistance to apoptosis and low proliferative capacity. We also studied a T cell subset expressing CD4+CD146+CCR5+, giving the capacity to migrate through endothelial structures and toward inflammatory sites. This population is significantly increased during cGVHD, and cGVHD murine models receiving splenocytes from CD146-/- mice showed improved clinical score. CD146 expression is associated with a Th17 polarization justifying a treatment by TMP778 (RORγt inhibitor) improving cGVHD in mice. The analysis of these different populations revealed an abnormal effector-regulator balance and potential therapeutic targets to evaluate in clinic
IAVAZZO, MARIA. "MIT/TFE FACTORS CONTROL ER-PHAGY VIA TRANSCRIPTIONAL REGULATION OF FAM134B." Doctoral thesis, Università degli Studi di Milano, 2022. https://hdl.handle.net/2434/947069.
Full textChenouard, Alexis. "Analyse des lymphocytes T folliculaires helper chez les patients tolérant leur greffon rénal." Thesis, Nantes, 2016. http://www.theses.fr/2016NANT1017/document.
Full textImmunosuppressive drugs largely contributed to a better graft survival over time in transplantation, but induced serious side effects (cancer, nephrotoxicity, infections…). In this context, some researchers focused on rare renal transplanted recipients, who maintain a good graft function without any immunosuppressive drugs during several years. These patients are named operationally tolerant patients and are of considerable interest to immunologists. Studies on these patients reveal a critical role of B cells, with particularly an in vitro B cell differentiation defect reported in tolerant patients. Based on this report, we focused on blood T follicular helper cells (TFH) which are known to be crucial for supporting B cell differentiation. At first, we reported a qualitative and quantitative TFH defect in tolerant patients compared to transplanted patients with stable graft function under immunosuppression. Moreover, we suggest a potential role of TFH in post graft immunization with donor-specific antibodies (DSA), which could explain the low incidence of post-graft DSA immunization reported in tolerant patients. Secondly, based on a transcriptomic analysis of purified TFH by RNA Sequencing, we have highlighted several TFH genes potentially interesting in tolerant patients, concerning the TFH regulation and the cooperation between TFH and B cells
Melo, Denise Cavalcante de [UNESP]. "Estruturação do Eumenine Mastroparano por dinâmica molecular em misturas de TFE-água." Universidade Estadual Paulista (UNESP), 2007. http://hdl.handle.net/11449/87500.
Full textConselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq)
O tetradecapeptídeo Eumenine mastoparano - AF (EMP-AF) extraído do veneno de vespa, em solução aquosa contendo trifluoretanol (TFE) mostra conformação helicoidal anfipática de acordo com os dados de Ressonância Magnética Nuclear (RMN) e Dicroísmo Circular (CD). A seqüência de aminoácidos tem o N-terminal amidado e três lisinas carregadas (5, 8 e 12). Nesse trabalho, investigamos a estrutura conformacional desse peptídeo em solução aquosa contendo TFE por simulação de dinâmica molecular usando o pacote GROMACS. As simulações foram feitas usando uma caixa cúbica que inclui o TFE (30%) e moléculas de água (70%). O método da troca de réplica foi usado para simular o sistema no intervalo de temperatura (280K - 350K) uniformemente distribuída em 14 processadores. Cada réplica numa dada temperatura T tem uma estrutura aleatória como conformação inicial. Em intervalos fixos de tempo, duas réplicas vizinhas tentam trocar conformações de acordo com a probabilidade de Boltzmann ( - onde = ( )( U), é 1/kBT e U a energia potencial). Apresentamos trajetórias que mostram claramente a formação de uma estrutura helicoidal (resíduos 3 e 12). Juntamente com a estrutura helicoidal, outras conformações tais como estruturas helicoidais parciais e folhas- também exibem estabilidade relativamente alta. A estrutura helicoidal está de acordo com as 20 estruturas disponíveis obtidas por RMN, com valores pequenos de RMSD. Também mostramos que a diversidade de estruturas obtidas por RMN está relacionada com flutuações globais da cadeia, como indicado pela análise de componentes principais. A projeção da trajetória de equilíbrio na primeira componente principal, de uma estrutura helicoidal obtida como conformação inicial, mostrou flutuações que aproximadamente reproduzem a diversidade de estruturas de RMN, que são devidas principalmente à flexibilidade do N- terminal do peptídeo.
Tetradecapeptide eumenine mastoparan-AF (EMP-AF) (14 residues) extracted from wasp venom, in solution with water and trifluoroethanol (TFE) show amphiphatic helical conformation, according with Nuclear Magnetic Resonance (NMR) and Circular Dichroism (CD) data. The amino acid sequence has amidated N-terminus and three charged lysine (5, 8 and 12). In this work, we have investigated structural conformations of this peptide in TFE aqueous solution by molecular dynamics simulations using GROMACS package. The simulations have been done using a cubic box that included TFE (30%) and water molecules (70%). The replica-exchange method was used to simulate the system in the temperature range (280K - 350K) uniformly distributed in 14 processors. Each replica, at a given T has a coil structure as the initial conformation. At fixed time intervals, two neighboring replica try to exchange configurations with Boltzmann probability e-D, where D = (Db)(DU), b is 1/kBT and U is potential energy. We present trajectories, which clearly show the formation of the helix structure of the peptide (residues 3 to 12). Along with the helix structure, other conformations, such as partial helical structure and b-sheet, also show relatively high stability. The helical structure shows good agreement with the twenty available NMR structures, with relatively small values of RMSD. It is also shown that this diversity of the NMR structures is related to global fluctuations of the chain, as indicated by a principal component analysis. The projection of equilibrium trajectory, with the obtained helix as the initial conformation, on the first principal component, showed fluctuations that nearly reproduce the diversity of the NMR structures, which are due, mainly, to the flexibility of the N-terminus of the peptide.
Books on the topic "Tfhe"
Achim, Grube Hans, Cowley Ian, and Berliner Kraft- und Licht (Bewag)-Aktiengesellschaft., eds. Elektropolis: Chancen & Visionen : Projektarbeiten der TFH Berlin = Chances & visions : project works of the TFH Berlin. Berlin: Jovis, 2002.
Find full textOwen, Ian Robin. The chemistry of some TFE oligomer derivatives. Birmingham: University of Birmingham, 1985.
Find full textNicholas, Anna Katherine. The professional's book of Rottweilers. Neptune City, NJ: T.F.H. Publications, 1991.
Find full textCatholic District School Board Writing Partnership (Ontario), Public District School Board Writing Partnership (Ontario), and Ontario Ministry of Education, eds. Hospitality and tourism: Course profile, grade 11, workplace preparation TFH3E. [Ontario]: Queen's Printer for Ontario, 2001.
Find full textAraújo, Alexandra María Rodrígues. Iglesias y organizaciones no confesionales en la Unión Europea: El artículo 17 del TFUE. Navarra, España: EUNSA, Ediciones Universidad de Navarra, S.A., 2012.
Find full textDavid, Siritzky, ed. Le Traité de Lisbonne: Commentaire, article par article, des nouveaux traités européens (TUE-TFUE). Paris: Documentation Française, 2008.
Find full textCampbell, T. I. Laboratory study of friction in TFE sliding surfaces for bridge bearings. [Downsview]: Research and Development Branch, Ontario Ministry of Transportation, 1989.
Find full textThe Collie. Ascot: T.F.H.Pubns., 1986.
Find full textThe collie. Neptune City, NJ: T.F.H. Publications, 1986.
Find full text(Mexico), Instituto Federal Electoral, and Mexico Tribunal Federal Electoral, eds. Ingreso del IFE y TFE a la Unión Interamericana de Organismos Electorales. México, D.F: Tribunal Federal Electoral, 1996.
Find full textBook chapters on the topic "Tfhe"
Okada, Hiroki, Shinsaku Kiyomoto, and Carlos Cid. "Integerwise Functional Bootstrapping on TFHE." In Lecture Notes in Computer Science, 107–25. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-62974-8_7.
Full textJoye, Marc. "TFHE Public-Key Encryption Revisited." In Topics in Cryptology – CT-RSA 2024, 277–91. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-58868-6_11.
Full textJiang, Yuting, and Jianghong Wei. "Batched Fully Homomorphic Encryption from TFHE." In Lecture Notes in Computer Science, 92–109. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-22390-7_7.
Full textChen, Hao, Ilaria Chillotti, and Yongsoo Song. "Multi-Key Homomorphic Encryption from TFHE." In Lecture Notes in Computer Science, 446–72. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34621-8_16.
Full textFrery, Jordan, Andrei Stoian, Roman Bredehoft, Luis Montero, Celia Kherfallah, Benoit Chevallier-Mames, and Arthur Meyre. "Privacy-Preserving Tree-Based Inference with TFHE." In Mobile, Secure, and Programmable Networking, 139–56. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-52426-4_10.
Full textWei, Benqiang, Ruida Wang, Zhihao Li, Qinju Liu, and Xianhui Lu. "Fregata: Faster Homomorphic Evaluation of AES via TFHE." In Lecture Notes in Computer Science, 392–412. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-49187-0_20.
Full textTrama, Daphné, Pierre-Emmanuel Clet, Aymen Boudguiga, and Renaud Sirdey. "Building Blocks for LSTM Homomorphic Evaluation with TFHE." In Cyber Security, Cryptology, and Machine Learning, 117–34. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-34671-2_9.
Full textStoian, Andrei, Jordan Frery, Roman Bredehoft, Luis Montero, Celia Kherfallah, and Benoit Chevallier-Mames. "Deep Neural Networks for Encrypted Inference with TFHE." In Cyber Security, Cryptology, and Machine Learning, 493–500. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-34671-2_34.
Full textWei, Benqiang, and Xianhui Lu. "Improved Homomorphic Evaluation for Hash Function Based on TFHE." In Information Security and Cryptology, 399–402. Singapore: Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-0945-8_25.
Full textLiu, Tzu-Li, Yu-Te Ku, Ming-Chien Ho, Feng-Hao Liu, Ming-Ching Chang, Chih-Fan Hsu, Wei-Chao Chen, and Shih-Hao Hung. "An Efficient CKKS-FHEW/TFHE Hybrid Encrypted Inference Framework." In Computer Security. ESORICS 2023 International Workshops, 535–51. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-54129-2_32.
Full textConference papers on the topic "Tfhe"
Joye, Marc, and Michael Walter. "Liberating TFHE." In CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3560827.3563376.
Full textBalenbois, Thibault, Jean-Baptiste Orfila, and Nigel Smart. "Trivial Transciphering With Trivium and TFHE." In CCS '23: ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2023. http://dx.doi.org/10.1145/3605759.3625255.
Full textLee, Changmin, Seonhong Min, Jinyeong Seo, and Yongsoo Song. "Faster TFHE Bootstrapping with Block Binary Keys." In ASIA CCS '23: ACM ASIA Conference on Computer and Communications Security. New York, NY, USA: ACM, 2023. http://dx.doi.org/10.1145/3579856.3595804.
Full textKlemsa, Jakub, and Melek Önen. "Parallel Operations over TFHE-Encrypted Multi-Digit Integers." In CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3508398.3511527.
Full textLi, Pengbo, Ting Gao, Huifang Huang, Jiani Cheng, Shuhong Gao, Zhigang Zeng, and Jinqiao Duan. "Privacy Preserving Discretized Spiking Neural Network with TFHE." In 2023 International Conference on Neuromorphic Computing (ICNC). IEEE, 2023. http://dx.doi.org/10.1109/icnc59488.2023.10462898.
Full textOng, Darren, Russell Yap, and Chern Nam Yap. "Comparison of cuFHE vs TFHE on Arithmetic Circuit Computation." In 2023 8th International Conference on Computer and Communication Systems (ICCCS). IEEE, 2023. http://dx.doi.org/10.1109/icccs57501.2023.10150632.
Full textNam, Kevin, Hyunyoung Oh, Hyungon Moon, and Yunheung Paek. "Accelerating N-Bit Operations over TFHE on Commodity CPU-FPGA." In ICCAD '22: IEEE/ACM International Conference on Computer-Aided Design. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3508352.3549413.
Full textSuemitsu, Kohei, Kotaro Matsuoka, Takashi Sato, and Masanori Hashimoto. "Logic Locking over TFHE for Securing User Data and Algorithms." In 2024 29th Asia and South Pacific Design Automation Conference (ASP-DAC). IEEE, 2024. http://dx.doi.org/10.1109/asp-dac58780.2024.10473831.
Full textWang, Chunping, Jiahui Chen, Xiaoli Zhang, and Hongbing Cheng. "An Efficient Fully Homomorphic Encryption Sorting Algorithm Using Addition Over TFHE." In 2022 IEEE 28th International Conference on Parallel and Distributed Systems (ICPADS). IEEE, 2023. http://dx.doi.org/10.1109/icpads56603.2022.00037.
Full textPrasetiyo, Adiwena Putra, and Joo-Young Kim. "Morphling: A Throughput-Maximized TFHE-based Accelerator using Transform-domain Reuse." In 2024 IEEE International Symposium on High-Performance Computer Architecture (HPCA). IEEE, 2024. http://dx.doi.org/10.1109/hpca57654.2024.00028.
Full textReports on the topic "Tfhe"
McWethy, L. M., K. L. Pearce, and D. R. Rector. Thermal-hydraulic analysis of TFE verification test UFAC-1. Office of Scientific and Technical Information (OSTI), September 1988. http://dx.doi.org/10.2172/6720471.
Full textTFE design package final report, TFE Verification Program. Office of Scientific and Technical Information (OSTI), June 1994. http://dx.doi.org/10.2172/10176875.
Full textTFE Verification Program. Office of Scientific and Technical Information (OSTI), March 1990. http://dx.doi.org/10.2172/7174547.
Full textTFE Verification Program. Office of Scientific and Technical Information (OSTI), May 1993. http://dx.doi.org/10.2172/6413953.
Full textTFE verification program. Office of Scientific and Technical Information (OSTI), April 1991. http://dx.doi.org/10.2172/5701034.
Full textConceptual design. Final report: TFE Verification Program. Office of Scientific and Technical Information (OSTI), March 1994. http://dx.doi.org/10.2172/10155357.
Full textConverter performance TFE Verification Program. Final test report. Office of Scientific and Technical Information (OSTI), March 1994. http://dx.doi.org/10.2172/10151325.
Full textSheath insulator final test report, TFE Verification Program. Office of Scientific and Technical Information (OSTI), July 1994. http://dx.doi.org/10.2172/10186032.
Full textFueled emitter final test report TFE Verification Program. Office of Scientific and Technical Information (OSTI), July 1994. http://dx.doi.org/10.2172/10176878.
Full textInsulator seal final test report, TFE Verification Program. Office of Scientific and Technical Information (OSTI), June 1994. http://dx.doi.org/10.2172/10176882.
Full text