Results 11 to 20 of about 31,711 (108)

Determination of a class of permutation quadrinomials

open access: yesProceedings of the London Mathematical Society, Volume 127, Issue 2, Page 221-260, August 2023., 2023
Abstract We determine all permutation polynomials over Fq2$\mathbb {F}_{q^2}$ of the form XrA(Xq−1)$X^r A(X^{q-1})$ where, for some Q$Q$ that is a power of the characteristic of Fq$\mathbb {F}_q$, we have r≡Q+1(modq+1)$r\equiv Q+1\pmod {q+1}$ and all terms of A(X)$A(X)$ have degrees in {0,1,Q,Q+1}$\lbrace 0,1,Q,Q+1\rbrace$.
Zhiguo Ding, Michael E. Zieve
wiley   +1 more source

The inverse problem for neural networks [PDF]

open access: yesAISoLA 2023, 2023
We study the problem of computing the preimage of a set under a neural network with piecewise-affine activation functions. We recall an old result that the preimage of a polyhedral set is again a union of polyhedral sets and can be effectively computed.
arxiv   +1 more source

Blockchain‐oriented location privacy preserving for cooperative spectrum sensing in 6G wireless networks

open access: yesIET Blockchain, Volume 3, Issue 2, Page 74-97, June 2023., 2023
Abstract In this article, the authors proposed a novel blockchain‐oriented location privacy‐preserving (BoLPP) for the Cooperative Spectrum Sensing (CSS) in 6G networks. In order to attain the sustainability of privacy and security for 6G wireless networks, it is a great challenge in this sensing as it faces various malicious attacks while the ...
Roopa Vuppula, Himansu Shekhar Pradhan
wiley   +1 more source

Quantum collision finding for homomorphic hash functions [PDF]

open access: yesarXiv, 2021
Hash functions are a basic cryptographic primitive. Certain hash functions try to prove security against collision and preimage attacks by reductions to known hard problems. These hash functions usually have some additional properties that allow for that reduction.
arxiv  

ArtProtect: Blockchain and NFC‐based anti‐counterfeit system for physical art

open access: yesIET Blockchain, Volume 4, Issue 4, Page 423-442, December 2024.
An anti‐counterfeiting system for physical art based on Ethereum blockchain and near‐field communication technology is proposed and implemented. The system leverages the use of Ethereum smart contracts and inter‐planetary file system to store artworks’ certificate of authenticity, and display them in a mobile app called ArtProtect.
Cindy Handoko Tantowibowo   +1 more
wiley   +1 more source

Systematic review: Comparing zk‐SNARK, zk‐STARK, and bulletproof protocols for privacy‐preserving authentication

open access: yesSECURITY AND PRIVACY, Volume 7, Issue 5, September/October 2024.
Abstract This systematic literature review examines the implementation and analysis of zk‐SNARK, zk‐STARK, and bulletproof non‐interactive zero‐knowledge proof (NIZKP) protocols in privacy‐preserving applications across diverse sectors. Examining 41 research works obtained through the systematic search queries and filtering criteria published from 2015
Bjorn Oude Roelink   +2 more
wiley   +1 more source

Badly approximable grids and k$k$‐divergent lattices

open access: yesMathematika, Volume 70, Issue 3, July 2024.
Abstract Let A∈Matm×n(R)$A\in \operatorname{Mat}_{m\times n}(\mathbb {R})$ be a matrix. In this paper, we investigate the set BadA⊂Tm$\operatorname{Bad}_A\subset \mathbb {T}^m$ of badly approximable targets for A$A$, where Tm$\mathbb {T}^m$ is the m$m$‐torus. It is well known that BadA$\operatorname{Bad}_A$ is a winning set for Schmidt's game and hence
Nikolay Moshchevitin   +2 more
wiley   +1 more source

Failing gracefully: Decryption failures and the Fujisaki-Okamoto transform [PDF]

open access: yesarXiv, 2022
In known security reductions for the Fujisaki-Okamoto transformation, decryption failures are handled via a reduction solving the rather unnatural task of finding failing plaintexts given the private key, resulting in a Grover search bound. Moreover, they require an implicit rejection mechanism for invalid ciphertexts to achieve a reasonable security ...
arxiv  

Multi‐hop anonymous payment channel network based on onion routing

open access: yesIET Blockchain, Volume 4, Issue 2, Page 197-208, June 2024.
To solve the payment channel network path privacy problem, we analyse the multi‐hop anonymous and privacy‐preserving payment channel network scheme and propose a multi‐hop anonymous payment channel network based on onion routing based on it. The scheme removes the routing assumptions of the original scheme, designs an onion routing‐based payment ...
Caimei Wang, Yudong Ren, Zhize Wu
wiley   +1 more source

Picard sheaves, local Brauer groups, and topological modular forms

open access: yesJournal of Topology, Volume 17, Issue 2, June 2024.
Abstract We develop tools to analyze and compare the Brauer groups of spectra such as periodic complex and real K$K$‐theory and topological modular forms, as well as the derived moduli stack of elliptic curves. In particular, we prove that the Brauer group of TMF$\mathrm{TMF}$ is isomorphic to the Brauer group of the derived moduli stack of elliptic ...
Benjamin Antieau   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy