Results 81 to 90 of about 22,820 (205)

Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security [PDF]

open access: yes, 2016
We construct an LWE-based key-policy attribute-based encryption (ABE) scheme that supports attributes of unbounded polynomial length. Namely, the size of the public parameters is a fixed polynomial in the security parameter and a depth bound, and with ...
Brakerski, Zvika, Vaikuntanathan, Vinod
core   +2 more sources

Platelet hyperreactivity and risk of ischemic placental disease: A prospective cohort study

open access: yesPregnancy, Volume 2, Issue 2, March 2026.
Abstract Introduction Platelet hyperreactivity is linked to inflammation and cardiovascular risk in nonpregnant populations, but its relationship to placentally mediated pregnancy outcomes is undefined. We prospectively evaluated platelet hyperreactivity in pregnancy and subsequent ischemic placental disease (IPD), and examined aspirin's (ASA) effect ...
Christina A. Penfield   +15 more
wiley   +1 more source

Are We Capturing Faunal Intactness? A Comparison of Intact Forest Landscapes and the “Last of the Wild in Each Ecoregion”

open access: yesFrontiers in Forests and Global Change, 2019
Efforts to designate priority areas for conservation have had a long history, with most modern initiatives focused on either designating areas important for biodiversity or those least impacted by direct human disturbance.
Andrew J. Plumptre   +15 more
doaj   +1 more source

Analysis on Aigis‐Enc: Asymmetrical and symmetrical

open access: yesIET Information Security, 2021
Aigis‐Enc is an encryption algorithm based on asymmetrical learning with errors (LWE). A thorough comparison between Aigis‐Enc (with the recommended parameters) and a symmetrical LWE encryption scheme on the same scale (the sampling parameters are {η1 ...
Yupu Hu, Siyue Dong, Xingting Dong
doaj   +1 more source

Provably Weak Instances of Ring-LWE Revisited [PDF]

open access: yes, 2016
In CRYPTO 2015, Elias, Lauter, Ozman and Stange described an attack on the non-dual decision version of the ring learning with errors problem RLWE for two special families of defining polynomials, whose construction depends on the modulusq that is being used.
Castryck, Wouter   +2 more
openaire   +2 more sources

Does a Small Country Have Meaningful Regional Personality Differences? The Case of Estonia

open access: yesJournal of Personality, Volume 94, Issue 1, Page 13-28, February 2026.
ABSTRACT Background Regional differences in the Big Five personality domains have been observed in several countries at different geographical granularities, often correlating with regional political, economic, social, and health (PESH) indicators.
Ling Xu   +6 more
wiley   +1 more source

A Multi-Bit Fully Homomorphic Encryption With Shorter Public Key From LWE

open access: yesIEEE Access, 2019
There has been a great deal of work on improving the efficiency of fully homomorphic encryption (FHE) scheme. Our approach, in this regard, is to use the idea of packed ciphertexts to construct a multi-bit FHE with a short public key on the basis of the ...
Xinxia Song, Zhigang Chen, Liang Chen
doaj   +1 more source

A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM [PDF]

open access: yes, 2017
Oblivious Transfer (OT) is a fundamental cryptographic protocol that finds a number of applications, in particular, as an essential building block for two-party and multi-party computation.
Barreto, Paulo S. L. M.   +4 more
core   +1 more source

Impacts of Atmospheric Rivers in Central Greenland: Snowfall, Clouds, and Atmospheric State

open access: yesJournal of Geophysical Research: Atmospheres, Volume 131, Issue 2, 28 January 2026.
Abstract Atmospheric rivers (ARs) are long bands of strong horizontal water vapor transport responsible for over 90% of total integrated vapor transport (IVT) in extratropical and polar regions. Using a 12‐year record (2010–2022) of ground‐based remote sensing, radiosonde, snow stake, and reanalysis data from Summit Station, Greenland, we quantify the ...
A. E. Wedum   +5 more
wiley   +1 more source

MA‐LCPPA: A Multi‐Aggregator Lattice‐Based Conditional Privacy‐Preserving Authentication Scheme for Scalable and Quantum‐Secure VANETs

open access: yesIET Intelligent Transport Systems, Volume 20, Issue 1, January/December 2026.
This paper addresses the limitations of existing conditional privacy‐preserving authentication (CPPA) schemes in vehicular ad hoc networks (VANETs), which are either computationally heavy or vulnerable to quantum attacks. It proposes a multi‐aggregator lattice‐based CPPA (MA‐LCPPA) framework that distributes verification across multiple roadside units ...
Adi El‐Dalahmeh, Jie Li
wiley   +1 more source

Home - About - Disclaimer - Privacy