Results 31 to 40 of about 243,777 (273)

VLSI Design and FPGA Implementation of an NTT Hardware Accelerator for Homomorphic SEAL-Embedded Library

open access: yesIEEE Access, 2023
Homomorphic Encryption (HE) allows performing specific algebraic computations on encrypted data without the need for decryption. For this reason, HE is emerging as a strong privacy-preserving solution in cloud computing environments since it allows to ...
Stefano Di Matteo   +2 more
doaj   +1 more source

Graph Networks as a Universal Machine Learning Framework for Molecules and Crystals [PDF]

open access: yes, 2019
Graph networks are a new machine learning (ML) paradigm that supports both relational reasoning and combinatorial generalization. Here, we develop universal MatErials Graph Network (MEGNet) models for accurate property prediction in both molecules and ...
Chen, Chi   +4 more
core   +4 more sources

True zero-training brain-computer interfacing: an online study [PDF]

open access: yes, 2014
Despite several approaches to realize subject-to-subject transfer of pre-trained classifiers, the full performance of a Brain-Computer Interface (BCI) for a novel user can only be reached by presenting the BCI system with data from the novel user.
Kindermans, Pieter-Jan   +4 more
core   +2 more sources

Lattice-Based proof of a shuffle [PDF]

open access: yes, 2019
In this paper we present the first fully post-quantum proof of a shuffle for RLWE encryption schemes. Shuffles are commonly used to construct mixing networks (mix-nets), a key element to ensure anonymity in many applications such as electronic voting ...
Costa, Nuria   +2 more
core   +1 more source

Lattice-Based Group Signature with Message Recovery for Federal Learning

open access: yesApplied Sciences, 2023
Federal learning and privacy protection are inseparable. The participants in federated learning need to be the targets of privacy protection. On the other hand, federated learning can also be used as a tool for privacy attacks.
Yongli Tang   +3 more
doaj   +1 more source

Machine Learning-Based Models for the Estimation of the Energy Consumption in Metal Forming Processes

open access: yesMetals, 2021
This research provides an insight on the performances of machine learning (ML)-based algorithms for the estimation of the energy consumption in metal forming processes and is applied to the radial-axial ring rolling process.
Irene Mirandola   +5 more
doaj   +1 more source

NTRU-type fully homomorphic encryption scheme without key switching

open access: yes网络与信息安全学报, 2017
In order to construct a fully homomorphic encryption scheme based on NTRU cryptosystem from ring learning with errors, noise growth and homomorphic property in the NTRU cryptosystem were analyzed. The con-cept of zero homomorphic encryption was introdced
Xin-xia SONG   +2 more
doaj   +3 more sources

Attacks on the Search-RLWE problem with small errors [PDF]

open access: yes, 2017
The Ring Learning-With-Errors (RLWE) problem shows great promise for post-quantum cryptography and homomorphic encryption. We describe a new attack on the non-dual search RLWE problem with small error widths, using ring homomorphisms to finite fields and
Chen, Hao   +2 more
core   +2 more sources

Anonymous Quantum Safe Construction of Three Party Authentication and Key Agreement Protocol for Mobile Devices

open access: yesIEEE Access
Once the shared secret key is established, three parties can use it for secure communication using symmetric-key encryption AES (128, 192, 256) algorithms or other cryptographic primitives.
Dharminder Chaudhary   +5 more
doaj   +1 more source

A New Algorithm for Solving Ring-LPN with a Reducible Polynomial [PDF]

open access: yes, 2014
The LPN (Learning Parity with Noise) problem has recently proved to be of great importance in cryptology. A special and very useful case is the RING-LPN problem, which typically provides improved efficiency in the constructed cryptographic primitive.
Guo, Qian   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy