Results 101 to 110 of about 22,820 (205)

A Cellular Automation for Real‐Time Electrolyte Wetting Simulation in Multilayer Lithium‐Ion Cells: From Lab Data to Full‐Scale Formats

open access: yesBatteries &Supercaps, Volume 8, Issue 12, December 2025.
A cellular automaton model is introduced for simulating electrolyte wetting in porous battery composites. The model offers high flexibility, near real‐time runtimes, and strong agreement with experimental data. Validated on individual and multilayer configurations, the model enables fast, accurate wetting prediction for pouch, and cylindrical cell ...
Nicolaj Kaden   +5 more
wiley   +1 more source

Chiffrement avancé à partir du problème Learning With Errors [PDF]

open access: yes, 2014
National audienceLe problèmeLearning With Errors (LWE) est algorithmiquement difficile pour des instances aléatoires. Il a été introduit par Oded Regev en 2005 et, depuis lors, il s'est avéré très utile pour construire des primitives cryptographiques ...
Laguillaumie, Fabien   +2 more
core   +2 more sources

(In)Security of Ring-LWE Under Partial Key Exposure

open access: yesJournal of Mathematical Cryptology, 2020
We initiate the study of partial key exposure in Ring-LWE (RLWE)-based cryptosystems. Specifically, we (1) Introduce the search and decision Leaky R-LWE assumptions (Leaky R-SLWE, Leaky R-DLWE), to formalize the hardness of search/decision RLWE under ...
Dachman-Soled Dana   +3 more
doaj   +1 more source

URDP: General Framework for Direct CCA2 Security from any Lattice-Based PKE Scheme [PDF]

open access: yes, 2013
Design efficient lattice-based cryptosystem secure against adaptive chosen ciphertext attack (IND-CCA2) is a challenge problem. To the date, full CCA2-security of all proposed lattice-based PKE schemes achieved by using a generic transformations such as ...
Rastaghi, Roohallah
core  

Ring-LWE Cryptography for the Number Theorist [PDF]

open access: yes, 2016
20 ...
Elias, Y.   +3 more
openaire   +3 more sources

Cold Boot Attacks on Ring and Module LWE Keys Under the NTT

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2018
In this work, we consider the ring- and module- variants of the LWE problem and investigate cold boot attacks on cryptographic schemes based on these problems, wherein an attacker is faced with the problem of recovering a scheme’s secret key from a noisy
Martin R. Albrecht   +2 more
doaj   +1 more source

CRT representation of LWE Based TFHE

open access: yesComputational and Applied Mathematics
Abstract Homomorphic encryption is a special type of encryption that allows you to perform homomorphic operations on encrypted data without decryption, ensuring data security. This is the most important system that needs to be developed for customer and/or patient privacy on behalf of all sectors using a cloud system.
Mehmet Özen   +3 more
openaire   +1 more source

Quantum-classical hybrid algorithm for solving the learning-with-errors problem on NISQ devices

open access: yesCommunications Physics
The Learning-With-Errors (LWE) problem is a fundamental computational challenge with implications for post-quantum cryptography and computational learning theory.
Muxi Zheng   +9 more
doaj   +1 more source

Topical rebamipide improves lid wiper epitheliopathy

open access: yesClinical Ophthalmology, 2013
Hirotaka Itakura,1,2 Tomoyuki Kashima,2 Mariko Itakura,1 Hideo Akiyama,2 Shoji Kishi2 1Department of Ophthalmology, Maebashi Red Cross Hospital, 2Department of Ophthalmology, Gunma University, School of Medicine, Maebashi, Japan Abstract: Administration ...
Itakura H   +4 more
doaj  

Sapphire: A Configurable Crypto-Processor for Post-Quantum Lattice-based Protocols

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2019
Public key cryptography protocols, such as RSA and elliptic curve cryptography, will be rendered insecure by Shor’s algorithm when large-scale quantum computers are built.
Utsav Banerjee   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy