Results 61 to 70 of about 2,794 (176)
Towards an interpreter for efficient encrypted computation [PDF]
Fully homomorphic encryption (FHE) techniques are capable of performing encrypted computation on Boolean circuits, i.e., the user specifies encrypted inputs to the program, and the server computes on the encrypted inputs.
Devadas, Srinivas +2 more
core +2 more sources
Abstract Large‐scale and intense heatwaves pose significant risks to ecosystems and human society due to associated heat and water stress. Heatwaves can be classified as daytime, nighttime, and compound, depending on their occurrence time. However, the factors shaping global spatiotemporal patterns of heatwaves remain poorly understood, especially ...
Kun Zhang +8 more
wiley +1 more source
Klepto for Ring-LWE encryption [PDF]
Forensic image recognition tools are used by law enforcement agencies all over the world to automatically detect illegal images on confiscated equipment. This detection is commonly done with the help of a strictly confidential database consisting of hash
Xiao, D. (Dianyan), Yu, Y. (Yang)
core +6 more sources
KINA: Karatsuba Initiated Novel Accelerator for Ring-Binary-LWE (RBLWE)-Based Post-Quantum Cryptography [PDF]
Pengzhou He +3 more
openalex +1 more source
Generic Quantum‐Safe IIoT Forensics Framework (QS‐IIoT‐F) ABSTRACT The continuous evolution of quantum computing has shown novel and transformative possibilities and critical implications for the Industrial Internet of Things (IIoT) forensic processes.
Victor R. Kebande
wiley +1 more source
Evaluation of Large Integer Multiplication Methods on Hardware [PDF]
Multipliers requiring large bit lengths have a major impact on the performance of many applications, such as cryptography, digital signal processing (DSP) and image processing.
Hanley, Neil +2 more
core +1 more source
Abstract Accurate observations of maritime low clouds are important for air and sea transportation, understanding boundary layer processes, and measuring Earth's radiation budget. The nighttime maritime low cloud extent is often determined in meteorological satellite imagery using the brightness‐temperature difference between the longwave infrared (e.g.
Jesse D. Turner +6 more
wiley +1 more source
A Privacy‐Preserving System for Confidential Carpooling Services Using Homomorphic Encryption
This research presents a homomorphic encryption‐based solution to enhance privacy in carpooling without compromising functionality. Rigorous experiments confirm its robustness, accuracy, and efficiency in securely matching users while preserving confidentiality.
David Palma +3 more
wiley +1 more source
Protocolos para votaciones electrónicas [PDF]
Propuesta de protocolo para una prueba de conocimiento nulo para verificar el correcto funcionamiento de un nodo mixnet en un esquema de votación electrónica que utiliza un cifrado post-cuántico basado en retículos.
Martínez Pinilla, Ramiro
core
Mode coupling by scattering in chiral nematic liquid crystal ring lasing [PDF]
Lasing in dye-doped chiral nematic liquid crystal can be realized with low pump energy and relatively high efficiency, thanks to the high reflectivity of the periodic structure.
Beeckman, Jeroen +4 more
core +2 more sources

