Results 81 to 90 of about 22,820 (205)
Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security [PDF]
We construct an LWE-based key-policy attribute-based encryption (ABE) scheme that supports attributes of unbounded polynomial length. Namely, the size of the public parameters is a fixed polynomial in the security parameter and a depth bound, and with ...
Brakerski, Zvika, Vaikuntanathan, Vinod
core +2 more sources
Platelet hyperreactivity and risk of ischemic placental disease: A prospective cohort study
Abstract Introduction Platelet hyperreactivity is linked to inflammation and cardiovascular risk in nonpregnant populations, but its relationship to placentally mediated pregnancy outcomes is undefined. We prospectively evaluated platelet hyperreactivity in pregnancy and subsequent ischemic placental disease (IPD), and examined aspirin's (ASA) effect ...
Christina A. Penfield +15 more
wiley +1 more source
Efforts to designate priority areas for conservation have had a long history, with most modern initiatives focused on either designating areas important for biodiversity or those least impacted by direct human disturbance.
Andrew J. Plumptre +15 more
doaj +1 more source
Analysis on Aigis‐Enc: Asymmetrical and symmetrical
Aigis‐Enc is an encryption algorithm based on asymmetrical learning with errors (LWE). A thorough comparison between Aigis‐Enc (with the recommended parameters) and a symmetrical LWE encryption scheme on the same scale (the sampling parameters are {η1 ...
Yupu Hu, Siyue Dong, Xingting Dong
doaj +1 more source
Provably Weak Instances of Ring-LWE Revisited [PDF]
In CRYPTO 2015, Elias, Lauter, Ozman and Stange described an attack on the non-dual decision version of the ring learning with errors problem RLWE for two special families of defining polynomials, whose construction depends on the modulusq that is being used.
Castryck, Wouter +2 more
openaire +2 more sources
Does a Small Country Have Meaningful Regional Personality Differences? The Case of Estonia
ABSTRACT Background Regional differences in the Big Five personality domains have been observed in several countries at different geographical granularities, often correlating with regional political, economic, social, and health (PESH) indicators.
Ling Xu +6 more
wiley +1 more source
A Multi-Bit Fully Homomorphic Encryption With Shorter Public Key From LWE
There has been a great deal of work on improving the efficiency of fully homomorphic encryption (FHE) scheme. Our approach, in this regard, is to use the idea of packed ciphertexts to construct a multi-bit FHE with a short public key on the basis of the ...
Xinxia Song, Zhigang Chen, Liang Chen
doaj +1 more source
A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM [PDF]
Oblivious Transfer (OT) is a fundamental cryptographic protocol that finds a number of applications, in particular, as an essential building block for two-party and multi-party computation.
Barreto, Paulo S. L. M. +4 more
core +1 more source
Impacts of Atmospheric Rivers in Central Greenland: Snowfall, Clouds, and Atmospheric State
Abstract Atmospheric rivers (ARs) are long bands of strong horizontal water vapor transport responsible for over 90% of total integrated vapor transport (IVT) in extratropical and polar regions. Using a 12‐year record (2010–2022) of ground‐based remote sensing, radiosonde, snow stake, and reanalysis data from Summit Station, Greenland, we quantify the ...
A. E. Wedum +5 more
wiley +1 more source
This paper addresses the limitations of existing conditional privacy‐preserving authentication (CPPA) schemes in vehicular ad hoc networks (VANETs), which are either computationally heavy or vulnerable to quantum attacks. It proposes a multi‐aggregator lattice‐based CPPA (MA‐LCPPA) framework that distributes verification across multiple roadside units ...
Adi El‐Dalahmeh, Jie Li
wiley +1 more source

