Results 81 to 90 of about 2,659 (196)
Classical Homomorphic Encryption for Quantum Circuits [PDF]
We present the first leveled fully homomorphic encryption scheme for quantum circuits with classical keys. The scheme allows a classical client to blindly delegate a quantum computation to a quantum server: an honest server is able to run the computation
Mahadev, Urmila
core +2 more sources
This paper addresses the limitations of existing conditional privacy‐preserving authentication (CPPA) schemes in vehicular ad hoc networks (VANETs), which are either computationally heavy or vulnerable to quantum attacks. It proposes a multi‐aggregator lattice‐based CPPA (MA‐LCPPA) framework that distributes verification across multiple roadside units ...
Adi El‐Dalahmeh, Jie Li
wiley +1 more source
A connection between cryptography and polynomial functions is extremely significant. Mathematical performance of polynomials helps to enhance the cryptographic primitives, which are trustworthy as well as straightforward representation tools, in everyday use. In this research, explicit topological sequences Qf which correspond to degree‐based, distance‐
Mohammad Mazyad Hazzazi +5 more
wiley +1 more source
SOFIR: Securely Outsourced Forensic Image Recognition [PDF]
Forensic image recognition tools are used by law enforcement agencies all over the world to automatically detect illegal images on confiscated equipment. This detection is commonly done with the help of a strictly confidential database consisting of hash
Bösch, Christoph +3 more
core +3 more sources
Morphology and function of pinniped necks: The long and short of it
Abstract Terrestrial vertebrates from at least 30 distinct lineages in both extinct and extant clades have returned to aquatic environments. With these transitions came numerous morphological adaptations to accommodate life in water. Relatively little attention has been paid to the cervical region when tracking this transition.
Justin Keller +3 more
wiley +1 more source
Mode coupling by scattering in chiral nematic liquid crystal ring lasing [PDF]
Lasing in dye-doped chiral nematic liquid crystal can be realized with low pump energy and relatively high efficiency, thanks to the high reflectivity of the periodic structure.
Beeckman, Jeroen +4 more
core +2 more sources
Abstract In 2023, atmospheric methane (CH4) saw a decrease in the annual growth rate following record increases from 2020 to 2022. Recent changes in CH4 remain difficult to quantify due to delays in near‐real‐time (NRT) carbon cycle estimates. However, NRT models and subseasonal‐to‐seasonal (S2S) forecasting can provide the opportunity to analyze ...
Colin A. Quinn +7 more
wiley +1 more source
A Survey on Homomorphic Encryption Schemes: Theory and Implementation
Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this approach poses privacy concerns.
Acar, Abbas +3 more
core +1 more source
SHIELD: Scalable Homomorphic Implementation of Encrypted Data-Classifiers [PDF]
Homomorphic encryption (HE) systems enable computations on encrypted data, without decrypting and without knowledge of the secret key. In this work, we describe an optimized Ring Learning With Errors (RLWE) based implementation of a variant of the HE ...
Gulak, Glenn +2 more
core +2 more sources
Secondary forests are crucial for achieving COP15/16 conservation goals. An operational national approach was developed to identify and characterise forest ecosystems based on the dominant tree species in the canopy, serving as indicators for ecosystem extent and condition.
Maïri Souza Oliveira +13 more
wiley +1 more source

