Results 11 to 20 of about 31,711 (108)
Determination of a class of permutation quadrinomials
Abstract We determine all permutation polynomials over Fq2$\mathbb {F}_{q^2}$ of the form XrA(Xq−1)$X^r A(X^{q-1})$ where, for some Q$Q$ that is a power of the characteristic of Fq$\mathbb {F}_q$, we have r≡Q+1(modq+1)$r\equiv Q+1\pmod {q+1}$ and all terms of A(X)$A(X)$ have degrees in {0,1,Q,Q+1}$\lbrace 0,1,Q,Q+1\rbrace$.
Zhiguo Ding, Michael E. Zieve
wiley +1 more source
The inverse problem for neural networks [PDF]
We study the problem of computing the preimage of a set under a neural network with piecewise-affine activation functions. We recall an old result that the preimage of a polyhedral set is again a union of polyhedral sets and can be effectively computed.
arxiv +1 more source
Abstract In this article, the authors proposed a novel blockchain‐oriented location privacy‐preserving (BoLPP) for the Cooperative Spectrum Sensing (CSS) in 6G networks. In order to attain the sustainability of privacy and security for 6G wireless networks, it is a great challenge in this sensing as it faces various malicious attacks while the ...
Roopa Vuppula, Himansu Shekhar Pradhan
wiley +1 more source
Quantum collision finding for homomorphic hash functions [PDF]
Hash functions are a basic cryptographic primitive. Certain hash functions try to prove security against collision and preimage attacks by reductions to known hard problems. These hash functions usually have some additional properties that allow for that reduction.
arxiv
ArtProtect: Blockchain and NFC‐based anti‐counterfeit system for physical art
An anti‐counterfeiting system for physical art based on Ethereum blockchain and near‐field communication technology is proposed and implemented. The system leverages the use of Ethereum smart contracts and inter‐planetary file system to store artworks’ certificate of authenticity, and display them in a mobile app called ArtProtect.
Cindy Handoko Tantowibowo+1 more
wiley +1 more source
Abstract This systematic literature review examines the implementation and analysis of zk‐SNARK, zk‐STARK, and bulletproof non‐interactive zero‐knowledge proof (NIZKP) protocols in privacy‐preserving applications across diverse sectors. Examining 41 research works obtained through the systematic search queries and filtering criteria published from 2015
Bjorn Oude Roelink+2 more
wiley +1 more source
Badly approximable grids and k$k$‐divergent lattices
Abstract Let A∈Matm×n(R)$A\in \operatorname{Mat}_{m\times n}(\mathbb {R})$ be a matrix. In this paper, we investigate the set BadA⊂Tm$\operatorname{Bad}_A\subset \mathbb {T}^m$ of badly approximable targets for A$A$, where Tm$\mathbb {T}^m$ is the m$m$‐torus. It is well known that BadA$\operatorname{Bad}_A$ is a winning set for Schmidt's game and hence
Nikolay Moshchevitin+2 more
wiley +1 more source
Failing gracefully: Decryption failures and the Fujisaki-Okamoto transform [PDF]
In known security reductions for the Fujisaki-Okamoto transformation, decryption failures are handled via a reduction solving the rather unnatural task of finding failing plaintexts given the private key, resulting in a Grover search bound. Moreover, they require an implicit rejection mechanism for invalid ciphertexts to achieve a reasonable security ...
arxiv
Multi‐hop anonymous payment channel network based on onion routing
To solve the payment channel network path privacy problem, we analyse the multi‐hop anonymous and privacy‐preserving payment channel network scheme and propose a multi‐hop anonymous payment channel network based on onion routing based on it. The scheme removes the routing assumptions of the original scheme, designs an onion routing‐based payment ...
Caimei Wang, Yudong Ren, Zhize Wu
wiley +1 more source
Picard sheaves, local Brauer groups, and topological modular forms
Abstract We develop tools to analyze and compare the Brauer groups of spectra such as periodic complex and real K$K$‐theory and topological modular forms, as well as the derived moduli stack of elliptic curves. In particular, we prove that the Brauer group of TMF$\mathrm{TMF}$ is isomorphic to the Brauer group of the derived moduli stack of elliptic ...
Benjamin Antieau+2 more
wiley +1 more source