Now showing items 136-138 of 55010

    • Securing Cryptographic Software via Typed Assembly Language 

      Song, Shixin; Dong, Tingzhen; Nwabueze, Kosi; Zanders, Julian; Erbsen, Andres; e.a. (ACM|Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025-11-22)
      Authors of cryptographic software are well aware that their code should not leak secrets through its timing behavior, and, until 2018, they believed that following industry-standard constant-time coding guidelines was ...
    • Study on LLMs for Promptagator-Style Dense Retriever Training 

      Gwon, Daniel; Jedidi, Nour; Lin, Jimmy (ACM|Proceedings of the 34th ACM International Conference on Information and Knowledge Management, 2025-11-10)
      Promptagator demonstrated that Large Language Models (LLMs) with few-shot prompts can be used as task-specific query generators for fine-tuning domain-specialized dense retrieval models. However, the original Promptagator ...
    • One-Sided Bounded Noise: Theory, Optimization Algorithms and Applications 

      Xiao, Hanshen; Wan, Jun; Shi, Elaine; Devadas, Srinivas (ACM|Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025-11-22)
      We investigate the optimal trade-off between utility and privacy using one-sided perturbation. Unlike conventional privacy-preserving statistical releases, randomization for obfuscating side-channel information is often ...