Results 171 to 180 of about 22,820 (205)

An MLWE-Based Cut-and-Choose Oblivious Transfer Protocol. [PDF]

open access: yesEntropy (Basel)
Tang Y   +5 more
europepmc   +1 more source

Characterizing Disease Severity Through Surgical Recurrence Rates in Idiopathic Subglottic Stenosis. [PDF]

open access: yesLaryngoscope
Bowen AJ   +15 more
europepmc   +1 more source

LWE

Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018
Bug reporting is a major part of software maintenance and due to its inherently asynchronous nature, duplicate bug reporting has become fairly common. Detecting duplicate bug reports is an important task in order to avoid the assignment of a same bug to different developers.
Amar Budhiraja   +2 more
openaire   +1 more source

Algebraically Structured LWE, Revisited

Journal of Cryptology, 2019
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Peikert, Chris, Pepin, Zachary
openaire   +2 more sources

Fractional LWE: A Nonlinear Variant of LWE

2019
Many cryptographic constructions are based on the famous problem LWE [Reg05]. In particular, this cryptographic problem is currently the most relevant to build FHE [GSW13, BV11]. In [BV11], encrypting x consists of randomly choosing a vector \(\varvec{c}\) satisfying \(\langle \varvec{s},\varvec{c}\rangle =x+\textsf {noise}\pmod q\) where \(\varvec{s}\)
Gavin, Gerald, Bonnevay, Stéphane
openaire   +2 more sources

Large Modulus Ring-LWE $$\ge $$ Module-LWE

2017
We present a reduction from the module learning with errors problem (MLWE) in dimension \(d\) and with modulus \(q\) to the ring learning with errors problem (RLWE) with modulus \(q^{d}\). Our reduction increases the LWE error rate \(\alpha \) by a quadratic factor in the ring dimension \(n\) and a square root in the module rank \(d\) for power-of-two ...
Martin R. Albrecht, Amit Deo
openaire   +1 more source

Computational fuzzy extractor from LWE

Theoretical Computer Science, 2023
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Zhou, Yu, Liu, Shengli, Cui, Nan
openaire   +1 more source

Hardness of Entropic Module-LWE

Theoretical Computer Science
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Hao Lin   +3 more
openaire   +2 more sources

Order-LWE and the Hardness of Ring-LWE with Entropic Secrets

2019
We propose a generalization of the celebrated Ring Learning with Errors (RLWE) problem (Lyubashevsky, Peikert and Regev, Eurocrypt 2010, Eurocrypt 2013), wherein the ambient ring is not the ring of integers of a number field, but rather an order (a full rank subring).
Bolboceanu, Madalina   +3 more
openaire   +1 more source

???????????? ?????????????????? ???????????????????????? ?????????????????????? Ring-LWE ???????????????????????? ?????????? ?? ?????????????????? ???????????????? ??????????????

2023
In terms of application of the generalized BKW algorithm, the estimates of security of Ring-LWE symmetric cryptosystem against chosen plaintext attack have been obtained. These estimates allow us to choose the cryptosystem parameters directly proceeding from requirements of its security against chosen plaintext attacks.
openaire   +1 more source

Home - About - Disclaimer - Privacy