Results 31 to 40 of about 2,451 (171)

On random tomography with unobservable projection angles [PDF]

open access: yes, 2009
We formulate and investigate a statistical inverse problem of a random tomographic nature, where a probability density function on $\mathbb{R}^3$ is to be recovered from observation of finitely many of its two-dimensional projections in random and ...
Panaretos, Victor M.
core   +2 more sources

Parallel implementation of CRYSTALS-Dilithium for effective signing and verification in autonomous driving environment

open access: yesICT Express, 2023
In the autonomous driving environment, each vehicle performs numerous signing and verification while sending and receiving BSMs (Basic Security Messages) in real-time.
Seog Chung Seo, SangWoo An
doaj   +1 more source

A Pipelined Hardware Design of FNTT and INTT of CRYSTALS-Kyber PQC Algorithm

open access: yesInformation
Lattice-based post-quantum cryptography (PQC) algorithms demand number theoretic transform (NTT)-based polynomial multiplications. NTT-based polynomials’ multiplication relies on the computation of forward number theoretic transform (FNTT) and inverse ...
Muhammad Rashid   +4 more
doaj   +1 more source

On the Relation of Delay Equations to First-Order Hyperbolic Partial Differential Equations [PDF]

open access: yes, 2013
This paper establishes the equivalence between systems described by a single first-order hyperbolic partial differential equation and systems described by integral delay equations.
Karafyllis, Iasson, Krstic, Miroslav
core   +1 more source

Parallel Accelerating Number Theoretic Transform for Bootstrapping on a Graphics Processing Unit

open access: yesMathematics
The bootstrapping procedure has become the main bottleneck affecting the efficiency of all known fully homomorphic encryption (FHE) schemes. The state-of-the-art scheme for efficient bootstrapping, which is called fully homomorphic encryption over the ...
Huixian Li   +3 more
doaj   +1 more source

Homomorphic Encryption on GPU

open access: yesIEEE Access, 2023
Homomorphic encryption (HE) is a cryptosystem that allows the secure processing of encrypted data. One of the most popular HE schemes is the Brakerski-Fan-Vercauteren (BFV), which supports somewhat (SWHE) and fully homomorphic encryption (FHE).
Ali Sah Ozcan   +3 more
doaj   +1 more source

Cluster Formation and Phase Transitions Induced by Vibrational Strong Coupling

open access: yesAngewandte Chemie, Volume 138, Issue 1, 2 January 2026.
Non ‐ resonant Rayleigh scattering reveals that vibrational strong coupling induces clustering and phase transitions in liquids that undergo well defined transitions with temperature and solvent composition. Abstract Vibrational strong coupling (VSC) has been shown to significantly modify the chemical and physical properties of molecules and materials.
K. Sandeep   +9 more
wiley   +2 more sources

Performance Evaluation of Interpolation Techniques in Shamir Secret Sharing Scheme

open access: yesIEEE Access
This work evaluates the performance of several polynomial interpolation techniques applied to the Shamir Secret Sharing (SSS) scheme, considering seven methods: Lagrange, Newton, Neville, Aitken, Lagrange Barycentric, Vandermonde, and the Fast Fourier ...
Thays R. N. Ferreira, Fabio Borges
doaj   +1 more source

Personal area technologies for internetworked services [PDF]

open access: yes, 2004
This article reviews wireless enabling technologies to support interworking of heterogeneous networks, and covers two relevant topics; personal area networks and multistandard terminals.
Beach, MA   +9 more
core   +2 more sources

Fast Digital Convolutions using Bit-Shifts [PDF]

open access: yes, 2010
An exact, one-to-one transform is presented that not only allows digital circular convolutions, but is free from multiplications and quantisation errors for transform lengths of arbitrary powers of two.
Chandra, Shekhar S.
core  

Home - About - Disclaimer - Privacy