Results 171 to 180 of about 22,820 (205)
An MLWE-Based Cut-and-Choose Oblivious Transfer Protocol. [PDF]
Tang Y +5 more
europepmc +1 more source
Characterizing Disease Severity Through Surgical Recurrence Rates in Idiopathic Subglottic Stenosis. [PDF]
Bowen AJ +15 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018
Bug reporting is a major part of software maintenance and due to its inherently asynchronous nature, duplicate bug reporting has become fairly common. Detecting duplicate bug reports is an important task in order to avoid the assignment of a same bug to different developers.
Amar Budhiraja +2 more
openaire +1 more source
Bug reporting is a major part of software maintenance and due to its inherently asynchronous nature, duplicate bug reporting has become fairly common. Detecting duplicate bug reports is an important task in order to avoid the assignment of a same bug to different developers.
Amar Budhiraja +2 more
openaire +1 more source
Algebraically Structured LWE, Revisited
Journal of Cryptology, 2019zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Peikert, Chris, Pepin, Zachary
openaire +2 more sources
Fractional LWE: A Nonlinear Variant of LWE
2019Many cryptographic constructions are based on the famous problem LWE [Reg05]. In particular, this cryptographic problem is currently the most relevant to build FHE [GSW13, BV11]. In [BV11], encrypting x consists of randomly choosing a vector \(\varvec{c}\) satisfying \(\langle \varvec{s},\varvec{c}\rangle =x+\textsf {noise}\pmod q\) where \(\varvec{s}\)
Gavin, Gerald, Bonnevay, Stéphane
openaire +2 more sources
Large Modulus Ring-LWE $$\ge $$ Module-LWE
2017We present a reduction from the module learning with errors problem (MLWE) in dimension \(d\) and with modulus \(q\) to the ring learning with errors problem (RLWE) with modulus \(q^{d}\). Our reduction increases the LWE error rate \(\alpha \) by a quadratic factor in the ring dimension \(n\) and a square root in the module rank \(d\) for power-of-two ...
Martin R. Albrecht, Amit Deo
openaire +1 more source
Computational fuzzy extractor from LWE
Theoretical Computer Science, 2023zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Zhou, Yu, Liu, Shengli, Cui, Nan
openaire +1 more source
Hardness of Entropic Module-LWE
Theoretical Computer SciencezbMATH Open Web Interface contents unavailable due to conflicting licenses.
Hao Lin +3 more
openaire +2 more sources
Order-LWE and the Hardness of Ring-LWE with Entropic Secrets
2019We propose a generalization of the celebrated Ring Learning with Errors (RLWE) problem (Lyubashevsky, Peikert and Regev, Eurocrypt 2010, Eurocrypt 2013), wherein the ambient ring is not the ring of integers of a number field, but rather an order (a full rank subring).
Bolboceanu, Madalina +3 more
openaire +1 more source
2023
In terms of application of the generalized BKW algorithm, the estimates of security of Ring-LWE symmetric cryptosystem against chosen plaintext attack have been obtained. These estimates allow us to choose the cryptosystem parameters directly proceeding from requirements of its security against chosen plaintext attacks.
openaire +1 more source
In terms of application of the generalized BKW algorithm, the estimates of security of Ring-LWE symmetric cryptosystem against chosen plaintext attack have been obtained. These estimates allow us to choose the cryptosystem parameters directly proceeding from requirements of its security against chosen plaintext attacks.
openaire +1 more source

