Results 51 to 60 of about 120,753 (284)
Hardware acceleration of number theoretic transform for zk‐SNARK
AbstractZk‐SNARK unleashes the great potential of ZKP (zero‐knowledge proof) in the blockchain, distributed storage, and so forth. However, the proof‐generation of zk‐SNARK is excessively time intensive, making it a challenge to deploy a high‐performance zk‐SNARK in most real applications.
Haixu Zhao +6 more
openaire +1 more source
SmallTalk: a novel small‐sized fusion tag for peptide expression and purification
The SmallTalk fusion tag allows for the efficient expression and purification of soluble recombinant proteins or peptides in Escherichia coli. Testing with SmallTalk‐GFP confirmed that the proteins were soluble and folded correctly, while SmallTalk‐Bin1b maintained its antimicrobial activity against various bacterial isolates. This streamlined workflow
Atika Tariq +3 more
wiley +1 more source
Parallel Accelerating Number Theoretic Transform for Bootstrapping on a Graphics Processing Unit
The bootstrapping procedure has become the main bottleneck affecting the efficiency of all known fully homomorphic encryption (FHE) schemes. The state-of-the-art scheme for efficient bootstrapping, which is called fully homomorphic encryption over the ...
Huixian Li +3 more
doaj +1 more source
Number theoretic transform (NTT) is widely utilized to speed up polynomial multiplication, which is the critical computation bottleneck in a lot of cryptographic algorithms like lattice-based post-quantum cryptography (PQC) and homomorphic encryption (HE)
Xiangren Chen +4 more
doaj +1 more source
Euler-Bessel and Euler-Fourier Transforms
We consider a topological integral transform of Bessel (concentric isospectral sets) type and Fourier (hyperplane isospectral sets) type, using the Euler characteristic as a measure.
Baryshnikov Y +9 more
core +2 more sources
This research protocol outlines a workflow for nuclear magnetic resonance (NMR)‐based metabolomics in the agri‐food sector. Using two case studies—strawberry leaves (solid matrix) and wine (liquid matrix)—it details the procedures for sample preparation, data acquisition, and processing.
Andrea Fernández‐Veloso +4 more
wiley +1 more source
Single-Trace Attack on NIST Round 3 Candidate Dilithium Using Machine Learning-Based Profiling
In this paper, we propose single-trace side-channel attacks against $\mathsf {CRYSTALS{-}DILITHIUM}$ . $\mathsf {CRYSTALS{-}DILITHIUM}$ is a lattice-based digital signature algorithm, one of the third round finalists of the national institute of ...
Jaeseung Han +7 more
doaj +1 more source
The Hamming and Golay Number-Theoretic Transforms [PDF]
New number-theoretic transforms are derived from known linear block codes over finite fields. In particular, two new such transforms are built from perfect codes, namely the \textit {Hamming number-theoretic transform} and the \textit {Golay number-theoretic transform}. A few properties of these new transforms are presented.
Paschoal, A. J. A. +2 more
openaire +2 more sources
KHS‐Cnd peptide is able to impair biofilm formation and disaggregate mature biofilms in Acinetobacter baumannii clinical isolates. Differences in extracellular metabolites reflect changes in biofilm metabolism due to KHS‐Cnd treatment. Among the differentially represented extracellular metabolites upon KHS‐Cnd treatment, the significantly altered ...
Fernando Porcelli +9 more
wiley +1 more source
In the autonomous driving environment, each vehicle performs numerous signing and verification while sending and receiving BSMs (Basic Security Messages) in real-time.
Seog Chung Seo, SangWoo An
doaj +1 more source

