Results 1 to 10 of about 1,743,904 (288)

Modern techniques in somewhat homomorphic encryption

open access: yesJournal of Mathematical Cryptology
The term “homomorphism” was introduced in cryptography by Rivest, Adleman, and Dertouzos in 1978 to address performing calculations on encrypted data without decryption.
Giulietti Massimo   +2 more
doaj   +1 more source

Bootstrapping Optimization Techniques for the FINAL Fully Homomorphic Encryption Scheme

open access: yesInformation
With the advent of cloud computing and the era of big data, there is an increasing focus on privacy computing. Consequently, homomorphic encryption, being a primary technique for achieving privacy computing, is held in high regard.
Meng Wu, Xiufeng Zhao, Weitao Song
doaj   +1 more source

Boosting Dictionary Learning with Error Codes

open access: yes, 2017
In conventional sparse representations based dictionary learning algorithms, initial dictionaries are generally assumed to be proper representatives of the system at hand. However, this may not be the case, especially in some systems restricted to random initializations. Therefore, a supposedly optimal state-update based on such an improper model might
Oktar, Yigit, Turkan, Mehmet
openaire   +2 more sources

Secure and Efficient Multi-Authority Attribute-Based Encryption Scheme From Lattices

open access: yesIEEE Access, 2019
Attribute-based encryption (ABE) mechanism on lattices can against quantum attack and guarantees fine-grained access control of encrypted data, and it has been widely used in cloud computing and privacy protection.
Yuan Liu   +3 more
doaj   +1 more source

Benchmarking Attacks on Learning with Errors

open access: yes2025 IEEE Symposium on Security and Privacy (SP)
Accepted at Oakland S&P ...
Wenger, Emily   +4 more
openaire   +2 more sources

ERRORS IN THE CLASSROOM: DILEMMAS AND PRACTICES

open access: yesLingua: Jurnal Bahasa, Sastra dan Pengajarannya, 2015
Human learning is fundamentally a process that involves the making of errors. But the issue of error and how errors are treated in the classroom is still dilemma for many teachers.
Taslimah Retno Marpinjun
doaj   +1 more source

Performance improvement of robots using a learning control scheme [PDF]

open access: yes
Many applications of robots require that the same task be repeated a number of times. In such applications, the errors associated with one cycle are also repeated every cycle of the operation.
Chiang, Pen-Tai   +2 more
core   +1 more source

On the independence heuristic in the dual attack

open access: yesJournal of Mathematical Cryptology
Post-quantum cryptography deals with the development and analysis of cryptographic schemes that are assumed to be secure even against attackers with access to a powerful quantum computer.
Bashiri Kaveh, Wiemers Andreas
doaj   +1 more source

mRLWE-CP-ABE: A revocable CP-ABE for post-quantum cryptography

open access: yesJournal of Mathematical Cryptology
We address the problem of user fast revocation in the lattice-based Ciphertext Policy Attribute-Based Encryption (CP-ABE) by extending the scheme originally introduced by Zhang and Zhang [Zhang J, Zhang Z.
Cianfriglia Marco   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy