Results 101 to 110 of about 22,820 (205)
A cellular automaton model is introduced for simulating electrolyte wetting in porous battery composites. The model offers high flexibility, near real‐time runtimes, and strong agreement with experimental data. Validated on individual and multilayer configurations, the model enables fast, accurate wetting prediction for pouch, and cylindrical cell ...
Nicolaj Kaden +5 more
wiley +1 more source
Chiffrement avancé à partir du problème Learning With Errors [PDF]
National audienceLe problèmeLearning With Errors (LWE) est algorithmiquement difficile pour des instances aléatoires. Il a été introduit par Oded Regev en 2005 et, depuis lors, il s'est avéré très utile pour construire des primitives cryptographiques ...
Laguillaumie, Fabien +2 more
core +2 more sources
(In)Security of Ring-LWE Under Partial Key Exposure
We initiate the study of partial key exposure in Ring-LWE (RLWE)-based cryptosystems. Specifically, we (1) Introduce the search and decision Leaky R-LWE assumptions (Leaky R-SLWE, Leaky R-DLWE), to formalize the hardness of search/decision RLWE under ...
Dachman-Soled Dana +3 more
doaj +1 more source
URDP: General Framework for Direct CCA2 Security from any Lattice-Based PKE Scheme [PDF]
Design efficient lattice-based cryptosystem secure against adaptive chosen ciphertext attack (IND-CCA2) is a challenge problem. To the date, full CCA2-security of all proposed lattice-based PKE schemes achieved by using a generic transformations such as ...
Rastaghi, Roohallah
core
Ring-LWE Cryptography for the Number Theorist [PDF]
20 ...
Elias, Y. +3 more
openaire +3 more sources
Cold Boot Attacks on Ring and Module LWE Keys Under the NTT
In this work, we consider the ring- and module- variants of the LWE problem and investigate cold boot attacks on cryptographic schemes based on these problems, wherein an attacker is faced with the problem of recovering a scheme’s secret key from a noisy
Martin R. Albrecht +2 more
doaj +1 more source
CRT representation of LWE Based TFHE
Abstract Homomorphic encryption is a special type of encryption that allows you to perform homomorphic operations on encrypted data without decryption, ensuring data security. This is the most important system that needs to be developed for customer and/or patient privacy on behalf of all sectors using a cloud system.
Mehmet Özen +3 more
openaire +1 more source
Quantum-classical hybrid algorithm for solving the learning-with-errors problem on NISQ devices
The Learning-With-Errors (LWE) problem is a fundamental computational challenge with implications for post-quantum cryptography and computational learning theory.
Muxi Zheng +9 more
doaj +1 more source
Topical rebamipide improves lid wiper epitheliopathy
Hirotaka Itakura,1,2 Tomoyuki Kashima,2 Mariko Itakura,1 Hideo Akiyama,2 Shoji Kishi2 1Department of Ophthalmology, Maebashi Red Cross Hospital, 2Department of Ophthalmology, Gunma University, School of Medicine, Maebashi, Japan Abstract: Administration ...
Itakura H +4 more
doaj
Sapphire: A Configurable Crypto-Processor for Post-Quantum Lattice-based Protocols
Public key cryptography protocols, such as RSA and elliptic curve cryptography, will be rendered insecure by Shor’s algorithm when large-scale quantum computers are built.
Utsav Banerjee +2 more
doaj +1 more source

