Results 71 to 80 of about 2,794 (176)

In Praise of Twisted Embeddings [PDF]

open access: yes, 2021
Our main result in this work is the extension of the Ring-LWE problem in lattice-based cryptography to include algebraic lattices, realized through twisted embeddings.
Diego F. Aranha   +4 more
core  

Impact of Left Ventricular‐Vascular Interaction on Long‐Term Outcome After Heart Transplantation

open access: yesClinical Transplantation, Volume 39, Issue 5, May 2025.
ABSTRACT Background and aim To compare pressure‐volume (PV) derivative variables between HT patients and healthy controls and to assess their impact on long‐term outcome. Methods In this single‐center retrospective study, HT patients surviving their first post‐HT year with left ventricular ejection fraction (LVEF) ≥50%, absence of allograft ...
Mattia Corianò   +10 more
wiley   +1 more source

Integer Version of Ring-LWE and its Applications [PDF]

open access: yes, 2021
In this work, we describe an integer version of ring-LWE over the polynomial rings and prove that its hardness is equivalent to one of the polynomial ring-LWE.
Gu Chunsheng
core  

Mem‐Transistor‐Based Gaussian Error–Generating Hardware for Post‐Quantum Cryptography Applications

open access: yesAdvanced Quantum Technologies, Volume 8, Issue 3, March 2025.
The demonstration of a Gaussian error sampler system that leverages the intrinsic stochastic characteristics of mem‐transistor semiconductor devices. The demonstrated Gaussian error sampler significantly reduces computational and memory overhead compared to existing techniques.
Moon‐Seok Kim   +3 more
wiley   +1 more source

Post-Quantum Universal Composable OT Based on Key Exchange

open access: yesIEEE Access, 2020
We construct a universal composable framework for two-message oblivious transfer protocols based on lattice-assumption. Compared with the paper proposed by Liu and Hu, we modify a framework proposed by Liu and Hu by adding three tools, which are XOR, Bit
Ding Hangchao, Han Jiang, Qiuliang Xu
doaj   +1 more source

Is there a link between access to broadband and health outcomes?

open access: yesThe American Journal of Economics and Sociology, Volume 84, Issue 2, Page 361-386, March 2025.
Abstract There is significant evidence of the positive effects of broadband expansion on various economic outcomes, including property values and business development, with a growing literature aimed at understanding the effect on health outcomes. We contribute to this later literature exploring the effect of broadband access on underexplored health ...
Vikas Gawai, Steven Deller
wiley   +1 more source

A Survey on Homomorphic Encryption Schemes: Theory and Implementation

open access: yes, 2017
Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this approach poses privacy concerns.
Acar, Abbas   +3 more
core   +1 more source

SHIELD: Scalable Homomorphic Implementation of Encrypted Data-Classifiers [PDF]

open access: yes, 2015
Homomorphic encryption (HE) systems enable computations on encrypted data, without decrypting and without knowledge of the secret key. In this work, we describe an optimized Ring Learning With Errors (RLWE) based implementation of a variant of the HE ...
Gulak, Glenn   +2 more
core   +2 more sources

Understory Environmental Conditions Drive Leaf Level‐Lipid Biosynthesis in a Deciduous and Evergreen Tree Species

open access: yesPlant, Cell &Environment, Volume 48, Issue 3, Page 1977-1992, March 2025.
ABSTRACT Plants in the understory experience climatic conditions affected by the overstory canopy that influence physiological and biochemical processes. Here, we investigate the relationships of leaf lipid molecular abundances to leaf water content, transmitted irradiance, and free‐air temperature (Tair) from deciduous angiosperm (Quercus buckleyi ...
Zhao Wang   +2 more
wiley   +1 more source

Modification of Frodokem Using Gray and Error-Correcting Codes

open access: yesIEEE Access, 2019
Lattice-based cryptography is one of the most promising schemes for post-quantum cryptography. Among the many lattice-based cryptosystems, FrodoKEM is a well-known key-encapsulation mechanism (KEM) based on (plain) learning with errors (LWE) problems and
Eunsang Lee   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy