BLEACH: Cleaning Errors in Discrete Computations Over CKKS
Drucker, Nir, Moshkowich, Guy, Pelleg, Tomer, Shaul, Hayim
Published in Journal of cryptology (2024)
Published in Journal of cryptology (2024)
Get full text
Journal Article
Secure Data Retrieval on the Cloud: Homomorphic Encryption meets Coresets
Adi Akavia, Dan Feldman, Hayim Shaul
Published in IACR transactions on cryptographic hardware and embedded systems (01.02.2019)
Published in IACR transactions on cryptographic hardware and embedded systems (01.02.2019)
Get full text
Journal Article
Secure Range-Searching Using Copy-And-Recurse
Kushnir, Eyal, Moshkowich, Guy, Shaul, Hayim
Published in Proceedings on Privacy Enhancing Technologies (01.07.2024)
Published in Proceedings on Privacy Enhancing Technologies (01.07.2024)
Get full text
Journal Article
Privacy Preserving Feature Selection for Sparse Linear Regression
Akavia, Adi, Galili, Ben, Shaul, Hayim, Weiss, Mor, Yakhini, Zohar
Published in Proceedings on Privacy Enhancing Technologies (01.01.2024)
Published in Proceedings on Privacy Enhancing Technologies (01.01.2024)
Get full text
Journal Article
Secure k-ish Nearest Neighbors Classifier
Shaul, Hayim, Feldman, Dan, Rus, Daniela
Published in Proceedings on Privacy Enhancing Technologies (01.07.2020)
Published in Proceedings on Privacy Enhancing Technologies (01.07.2020)
Get full text
Journal Article
Efficient Privacy-Preserving Viral Strain Classification via k-mer Signatures and FHE
Akavia, Adi, Galili, Ben, Shaul, Hayim, Weiss, Mor, Yakhini, Zohar
Published in 2023 IEEE 36th Computer Security Foundations Symposium (CSF) (01.07.2023)
Published in 2023 IEEE 36th Computer Security Foundations Symposium (CSF) (01.07.2023)
Get full text
Conference Proceeding
Secure Data Retrieval on the Cloud: Homomorphic Encryption meets Coresets
Akavia, Adi, Feldman, Dan, Shaul, Hayim
Published in IACR transactions on cryptographic hardware and embedded systems (28.02.2019)
Published in IACR transactions on cryptographic hardware and embedded systems (28.02.2019)
Get full text
Journal Article
HeLayers: A Tile Tensors Framework for Large Neural Networks on Encrypted Data
Aharoni, Ehud, Adir, Allon, Baruch, Moran, Drucker, Nir, Ezov, Gilad, Farkash, Ariel, Greenberg, Lev, Masalha, Ramy, Moshkowich, Guy, Murik, Dov, Shaul, Hayim, Soceanu, Omri
Published in Proceedings on Privacy Enhancing Technologies (01.01.2023)
Published in Proceedings on Privacy Enhancing Technologies (01.01.2023)
Get full text
Journal Article
Using Cell Phone Technology to Investigate a Deliberate Bacillus anthracis Release Scenario
Eisenkraft, Arik, Afriat, Amichay, Hubary, Yechiel, Lev, Ron, Shaul, Hayim, Balicer, Ran D
Published in Health security (01.01.2018)
Published in Health security (01.01.2018)
Get more information
Journal Article
Generating One-Hot Maps under Encryption
Aharoni, Ehud, Drucker, Nir, Kushnir, Eyal, Masalha, Ramy, Shaul, Hayim
Published in arXiv.org (11.06.2023)
Published in arXiv.org (11.06.2023)
Get full text
Paper
Journal Article
Efficient Pruning for Machine Learning Under Homomorphic Encryption
Aharoni, Ehud, Moran, Baruch, Bose, Pradip, Alper Buyuktosunoglu, Drucker, Nir, Pal, Subhankar, Pelleg, Tomer, Sarpatwar, Kanthi, Shaul, Hayim, Soceanu, Omri, Vaculin, Roman
Published in arXiv.org (04.11.2024)
Published in arXiv.org (04.11.2024)
Get full text
Paper
Journal Article
Neural network training with homomorphic encryption
Adir, Allon, Aharoni, Ehud, Greenberg, Lev, Shaul, Hayim, Drucker, Nir
Year of Publication 29.10.2024
Get full text
Year of Publication 29.10.2024
Patent
PROCESSING COMPLEX PACKED TENSORS USING INTEGRATED CIRCUIT OF REAL AND COMPLEX PACKED TENSORS IN COMPLEX DOMAIN
EZOV, Gilad, AHARONI, Ehud, SOCEANU, Omri, SHAUL, Hayim, DRUCKER, Nir
Year of Publication 18.04.2024
Get full text
Year of Publication 18.04.2024
Patent