Results 31 to 40 of about 243,777 (273)
Homomorphic Encryption (HE) allows performing specific algebraic computations on encrypted data without the need for decryption. For this reason, HE is emerging as a strong privacy-preserving solution in cloud computing environments since it allows to ...
Stefano Di Matteo +2 more
doaj +1 more source
Graph Networks as a Universal Machine Learning Framework for Molecules and Crystals [PDF]
Graph networks are a new machine learning (ML) paradigm that supports both relational reasoning and combinatorial generalization. Here, we develop universal MatErials Graph Network (MEGNet) models for accurate property prediction in both molecules and ...
Chen, Chi +4 more
core +4 more sources
True zero-training brain-computer interfacing: an online study [PDF]
Despite several approaches to realize subject-to-subject transfer of pre-trained classifiers, the full performance of a Brain-Computer Interface (BCI) for a novel user can only be reached by presenting the BCI system with data from the novel user.
Kindermans, Pieter-Jan +4 more
core +2 more sources
Lattice-Based proof of a shuffle [PDF]
In this paper we present the first fully post-quantum proof of a shuffle for RLWE encryption schemes. Shuffles are commonly used to construct mixing networks (mix-nets), a key element to ensure anonymity in many applications such as electronic voting ...
Costa, Nuria +2 more
core +1 more source
Lattice-Based Group Signature with Message Recovery for Federal Learning
Federal learning and privacy protection are inseparable. The participants in federated learning need to be the targets of privacy protection. On the other hand, federated learning can also be used as a tool for privacy attacks.
Yongli Tang +3 more
doaj +1 more source
This research provides an insight on the performances of machine learning (ML)-based algorithms for the estimation of the energy consumption in metal forming processes and is applied to the radial-axial ring rolling process.
Irene Mirandola +5 more
doaj +1 more source
NTRU-type fully homomorphic encryption scheme without key switching
In order to construct a fully homomorphic encryption scheme based on NTRU cryptosystem from ring learning with errors, noise growth and homomorphic property in the NTRU cryptosystem were analyzed. The con-cept of zero homomorphic encryption was introdced
Xin-xia SONG +2 more
doaj +3 more sources
Attacks on the Search-RLWE problem with small errors [PDF]
The Ring Learning-With-Errors (RLWE) problem shows great promise for post-quantum cryptography and homomorphic encryption. We describe a new attack on the non-dual search RLWE problem with small error widths, using ring homomorphisms to finite fields and
Chen, Hao +2 more
core +2 more sources
Once the shared secret key is established, three parties can use it for secure communication using symmetric-key encryption AES (128, 192, 256) algorithms or other cryptographic primitives.
Dharminder Chaudhary +5 more
doaj +1 more source
A New Algorithm for Solving Ring-LPN with a Reducible Polynomial [PDF]
The LPN (Learning Parity with Noise) problem has recently proved to be of great importance in cryptology. A special and very useful case is the RING-LPN problem, which typically provides improved efficiency in the constructed cryptographic primitive.
Guo, Qian +2 more
core +1 more source

