Sergiu Carpov

ORCID: 0000-0003-1724-1591
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • Cryptographic Implementations and Security
  • Coding theory and cryptography
  • Chaos-based Image/Signal Encryption
  • Complexity and Algorithms in Graphs
  • Interconnection Networks and Systems
  • Parallel Computing and Optimization Techniques
  • Cancer Genomics and Diagnostics
  • Embedded Systems Design Techniques
  • Cryptography and Residue Arithmetic
  • Internet Traffic Analysis and Secure E-voting
  • Distributed and Parallel Computing Systems
  • VLSI and Analog Circuit Testing
  • VLSI and FPGA Design Techniques
  • Advanced Data Storage Technologies
  • Genomic variations and chromosomal abnormalities
  • Cloud Data Security Solutions
  • History and Theory of Mathematics
  • Analytic Number Theory Research
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Blockchain Technology Applications and Security
  • Advanced Steganography and Watermarking Techniques
  • Scheduling and Optimization Algorithms
  • Security and Verification in Computing

University of Lausanne
2019-2023

CEA LIST
2010-2021

Commissariat à l'Énergie Atomique et aux Énergies Alternatives
2011-2021

École Polytechnique Fédérale de Lausanne
2020-2021

Integra (United States)
2011-2015

Université de Technologie de Compiègne
2010-2011

Centre National de la Recherche Scientifique
2010-2011

Heuristics and Diagnostics for Complex Systems
2011

In this work we present Armadillo a compilation chain used for compiling applications written in high-level language (C++) to on encrypted data. The back-end of the is based homomorphic encryption. tool-chain further automatically handle huge amount parallelism so as mitigate performance overhead using

10.1145/2732516.2732520 article EN 2015-04-03

Genotype imputation is a fundamental step in genomic data analysis, where missing variant genotypes are predicted using the existing of nearby "tag" variants. Although researchers can outsource genotype imputation, privacy concerns may prohibit genetic sharing with an untrusted service. Here, we developed secure efficient homomorphic encryption (HE) techniques. In HE-based methods, while it transit, at rest, and analysis. It only be decrypted by owner. We compared three state-of-the-art...

10.1016/j.cels.2021.07.010 article EN cc-by-nc-nd Cell Systems 2021-08-30

Abstract Background Privacy-preserving computations on genomic data, and more generally medical is a critical path technology for innovative, life-saving research to positively equally impact the global population. It enables algorithms be securely deployed in cloud because operations encrypted databases are conducted without revealing any individual genomes. Methods secure computation have shown significant performance improvements over last several years. However, it still challenging...

10.1186/s12920-020-0723-0 article EN cc-by BMC Medical Genomics 2020-07-01

The use of remote services offered by cloud providers have been popular in the last lustrum. Services allow users to store files, or analyze data for several purposes, like health-care message analysis. However, when personal are sent Cloud, may lose privacy on data-content, and other side those their own businesses. In this paper, we present our solution health-data directly into Cloud while preserving privacy. Our makes homomorphic encryption protect during particular, developed a mobile...

10.1109/cloud.2016.0084 article EN 2016-06-01

The ever-growing number of cores in embedded chips emphasizes more than ever the complexity inherent to parallel pro- gramming. To solve these programmability issues, there is a renewed interest dataflow paradigm. In this context, we present compilation toolchain for ΣC language, which allows hierarchical construction stream applications and automatic mapping application an manycore target. As demonstration toolchain, implementation H.264 encoder evaluate its performance on Kalray's MPPA chip.

10.1016/j.procs.2013.05.330 article EN Procedia Computer Science 2013-01-01

We present a framework GenoPPML for privacy-preserving machine learning in the context of sensitive genomic data processing. The technology combines secure multiparty computation techniques based on recently proposed Manticore model training and fully homomorphic encryption TFHE inference. was successfully used to solve breast cancer prediction problems gene expression datasets coming from distinct private sources while preserving their privacy - solution winning 1st place both Tracks I III...

10.1109/cloud55607.2022.00076 preprint EN 2022-07-01

ABSTRACT Genotype imputation is a fundamental step in genomic data analysis such as GWAS, where missing variant genotypes are predicted using the existing of nearby ‘tag’ variants. Imputation greatly decreases genotyping cost and provides high-quality estimates common genotypes. As population panels increase, e.g., TOPMED Project, genotype becoming more accurate, but it requires high computational power. Although researchers can outsource imputation, privacy concerns may prohibit genetic...

10.1101/2020.07.02.183459 preprint EN cc-by-nc-nd bioRxiv (Cold Spring Harbor Laboratory) 2020-07-04

One of the 3 tracks iDASH Privacy & Security Workshop 2017 competition was to execute a whole genome variants search on private genomic data. Particularly, application find top most significant SNPs (Single-Nucleotide Polymorphisms) in database records labeled with control or case. In this paper we discuss solution submitted by our team competition.Privacy and confidentiality data had be ensured using Intel SGX enclaves. The typical use-case is multi-party computation (each party possessing...

10.1186/s12920-018-0399-x article EN cc-by BMC Medical Genomics 2018-10-01

In 2009, Craig Gentry introduced the first "fully" homomorphic encryption scheme allowing arbitrary circuits to be evaluated on encrypted data. Homomorphic is a very powerful cryptographic primitive, though it has often been viewed by practitioners as too inefficient for practical applications. However, performance of these schemes come long way from that Gentry's original work: there are now several well-maintained libraries implementing and protocols demonstrating impressive results,...

10.1145/3243734.3264420 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2018-10-15

In this work we describe a message packing and unpacking method for homomorphic ciphertexts. Messages are packed into the coefficients of plaintext polynomials. We propose an procedure which allows to obtain ciphertext each message. The ciphertexts represents solution reducing transmission bottleneck in cloud based applications, particular when sending calculations results. results (packing ratio, time) compared existing methods on trans-ciphering.

10.1145/2898445.2898452 article EN 2016-05-24

This paper deals with semantics-preserving parallelism reduction methods for cyclo-static dataflow applications.Parallelism is the process of equivalent actors fusioning.The principal objectives are to decrease memory footprint an application and increase its execution performance.We focus on methodologies constrained by throughput.A generic methodology introduced.Experimental results provided asserting performance proposed method.

10.1016/j.procs.2013.05.166 article EN Procedia Computer Science 2013-01-01

In this paper, we examine and propose a solution for the challenges of sharing genome sequence data querying on cloud server in per-sonalized medicine scenarios. We develop privacy-preserving, secure efficient personalized medicine. The that making use stream cipher-based homomorphic transciphering server, to show effectiveness scenario. This paper also provides comparative analysis well-known existing encryption solutions BGV FV schemes combined with FLIP cipher demonstrate efficiency...

10.1109/fmec.2018.8364056 preprint EN 2018-04-01

FPGA floorplannig consists in finding a satisfactory placement of the different pre-determined regions design, onto resource matrix that composes hardware. Performance is ensured by minimizing distances between communicating regions, as well and their I/O ports on FPGA. To this very challenging problem, additional features can be added, such taking into account existence partially-reconfigurable regions. This paper presents solution method we proposed RAW Floorplanning Desing Contest,...

10.1109/ipdpsw.2018.00208 article EN 2022 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW) 2018-05-01

Abstract Classification algorithms/tools become more and powerful pervasive. Yet, for some use cases, it is necessary to be able protect data privacy while benefiting from the functionalities they provide. Among tools that may used ensure such privacy, we are focusing in this paper on functional encryption . These relatively new cryptographic primitives enable evaluation of functions over encrypted inputs, outputting cleartext results. Theoretically, property makes them well-suited process...

10.2478/popets-2020-0015 article EN cc-by-nc-nd Proceedings on Privacy Enhancing Technologies 2020-04-01
Coming Soon ...