Results 71 to 80 of about 2,794 (176)
In Praise of Twisted Embeddings [PDF]
Our main result in this work is the extension of the Ring-LWE problem in lattice-based cryptography to include algebraic lattices, realized through twisted embeddings.
Diego F. Aranha +4 more
core
Impact of Left Ventricular‐Vascular Interaction on Long‐Term Outcome After Heart Transplantation
ABSTRACT Background and aim To compare pressure‐volume (PV) derivative variables between HT patients and healthy controls and to assess their impact on long‐term outcome. Methods In this single‐center retrospective study, HT patients surviving their first post‐HT year with left ventricular ejection fraction (LVEF) ≥50%, absence of allograft ...
Mattia Corianò +10 more
wiley +1 more source
Integer Version of Ring-LWE and its Applications [PDF]
In this work, we describe an integer version of ring-LWE over the polynomial rings and prove that its hardness is equivalent to one of the polynomial ring-LWE.
Gu Chunsheng
core
Mem‐Transistor‐Based Gaussian Error–Generating Hardware for Post‐Quantum Cryptography Applications
The demonstration of a Gaussian error sampler system that leverages the intrinsic stochastic characteristics of mem‐transistor semiconductor devices. The demonstrated Gaussian error sampler significantly reduces computational and memory overhead compared to existing techniques.
Moon‐Seok Kim +3 more
wiley +1 more source
Post-Quantum Universal Composable OT Based on Key Exchange
We construct a universal composable framework for two-message oblivious transfer protocols based on lattice-assumption. Compared with the paper proposed by Liu and Hu, we modify a framework proposed by Liu and Hu by adding three tools, which are XOR, Bit
Ding Hangchao, Han Jiang, Qiuliang Xu
doaj +1 more source
Is there a link between access to broadband and health outcomes?
Abstract There is significant evidence of the positive effects of broadband expansion on various economic outcomes, including property values and business development, with a growing literature aimed at understanding the effect on health outcomes. We contribute to this later literature exploring the effect of broadband access on underexplored health ...
Vikas Gawai, Steven Deller
wiley +1 more source
A Survey on Homomorphic Encryption Schemes: Theory and Implementation
Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this approach poses privacy concerns.
Acar, Abbas +3 more
core +1 more source
SHIELD: Scalable Homomorphic Implementation of Encrypted Data-Classifiers [PDF]
Homomorphic encryption (HE) systems enable computations on encrypted data, without decrypting and without knowledge of the secret key. In this work, we describe an optimized Ring Learning With Errors (RLWE) based implementation of a variant of the HE ...
Gulak, Glenn +2 more
core +2 more sources
ABSTRACT Plants in the understory experience climatic conditions affected by the overstory canopy that influence physiological and biochemical processes. Here, we investigate the relationships of leaf lipid molecular abundances to leaf water content, transmitted irradiance, and free‐air temperature (Tair) from deciduous angiosperm (Quercus buckleyi ...
Zhao Wang +2 more
wiley +1 more source
Modification of Frodokem Using Gray and Error-Correcting Codes
Lattice-based cryptography is one of the most promising schemes for post-quantum cryptography. Among the many lattice-based cryptosystems, FrodoKEM is a well-known key-encapsulation mechanism (KEM) based on (plain) learning with errors (LWE) problems and
Eunsang Lee +4 more
doaj +1 more source

