Improving cache management policies using dynamic reuse distances N Duong, D Zhao, T Kim, R Cammarota, M Valero, AV Veidenbaum 2012 45Th annual IEEE/ACM international symposium on microarchitecture, 389-400, 2012 | 180 | 2012 |
Toward trustworthy AI development: mechanisms for supporting verifiable claims M Brundage, S Avin, J Wang, H Belfield, G Krueger, G Hadfield, H Khlaaf, ... arXiv preprint arXiv:2004.07213, 2020 | 128 | 2020 |
Post-quantum lattice-based cryptography implementations: A survey H Nejatollahi, N Dutt, S Ray, F Regazzoni, I Banerjee, R Cammarota ACM Computing Surveys (CSUR) 51 (6), 1-41, 2019 | 118 | 2019 |
nGraph-HE2: A high-throughput framework for neural network inference on encrypted data F Boemer, A Costache, R Cammarota, C Wierzynski Proceedings of the 7th ACM Workshop on Encrypted Computing & Applied …, 2019 | 86 | 2019 |
nGraph-HE: a graph compiler for deep learning on homomorphically encrypted data F Boemer, Y Lao, R Cammarota, C Wierzynski Proceedings of the 16th ACM International Conference on Computing Frontiers …, 2019 | 71 | 2019 |
MP2ML: A mixed-protocol machine learning framework for private inference F Boemer, R Cammarota, D Demmler, T Schneider, H Yalame Proceedings of the 15th International Conference on Availability …, 2020 | 48 | 2020 |
Method and system for predicting performance of software applications on prospective hardware architecture A Kejariwal, P D'alberto, S Panigrahi, R Cammarota US Patent 8,818,787, 2014 | 36 | 2014 |
Maskednet: The first hardware inference engine aiming power side-channel protection A Dubey, R Cammarota, A Aysu 2020 IEEE International Symposium on Hardware Oriented Security and Trust …, 2020 | 33 | 2020 |
Methods for detecting security incidents in home networks R Cammarota, P Tinnakornsrisuphap US Patent App. 15/183,401, 2017 | 30 | 2017 |
WebRTCbench: a benchmark for performance assessment of webRTC implementations S Taheri, LA Beni, AV Veidenbaum, A Nicolau, R Cammarota, J Qiu, Q Lu, ... 2015 13th IEEE Symposium on Embedded Systems For Real-time Multimedia …, 2015 | 25 | 2015 |
Domain-specific accelerators for ideal lattice-based public key protocols H Nejatollahi, N Dutt, I Banerjee, R Cammarota Cryptology ePrint Archive, 2018 | 20 | 2018 |
Cryptographic cipher with finite subfield lookup tables for use in masked operations R Cammarota, OJ Benoit, A Palanigounder US Patent App. 14/642,591, 2016 | 19 | 2016 |
Maskednet: A pathway for secure inference against power side-channel attacks A Dubey, R Cammarota, A Aysu arXiv preprint arXiv:1910.13063, 2019 | 18 | 2019 |
CAMFAS: A compiler approach to mitigate fault attacks via enhanced SIMDization Z Chen, J Shen, A Nicolau, A Veidenbaum, NF Ghalaty, R Cammarota 2017 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 57-64, 2017 | 18 | 2017 |
Exploring energy efficient quantum-resistant signal processing using array processors H Nejatollahi, S Shahhosseini, R Cammarota, N Dutt ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and …, 2020 | 17 | 2020 |
BoMaNet: Boolean masking of an entire neural network A Dubey, R Cammarota, A Aysu 2020 IEEE/ACM International Conference On Computer Aided Design (ICCAD), 1-9, 2020 | 16 | 2020 |
Special session: Trends, challenges and needs for lattice-based cryptography implementations H Nejatollahi, N Dutt, R Cammarota 2017 International Conference on Hardware/Software Codesign and System …, 2017 | 15 | 2017 |
Optimizing program performance via similarity, using a feature-agnostic approach R Cammarota, LA Beni, A Nicolau, AV Veidenbaum International Workshop on Advanced Parallel Processing Technologies, 199-213, 2013 | 15 | 2013 |
SCORE: A score-based memory cache replacement policy N Duong, R Cammarota, D Zhao, T Kim, A Veidenbaum JWAC 2010-1st JILP Worshop on Computer Architecture Competitions: cache …, 2010 | 15 | 2010 |
Flexible ntt accelerators for rlwe lattice-based cryptography H Nejatollahi, R Cammarota, N Dutt 2019 IEEE 37th International Conference on Computer Design (ICCD), 329-332, 2019 | 13 | 2019 |