Results 21 to 30 of about 243,777 (279)
Cold Boot Attacks on Ring and Module LWE Keys Under the NTT
In this work, we consider the ring- and module- variants of the LWE problem and investigate cold boot attacks on cryptographic schemes based on these problems, wherein an attacker is faced with the problem of recovering a scheme’s secret key from a noisy
Martin R. Albrecht +2 more
doaj +1 more source
On error distributions in ring-based LWE [PDF]
Since its introduction in 2010 by Lyubashevsky, Peikert and Regev, the ring learning with errors problem (ring-LWE) has become a popular building block for cryptographic primitives, due to its great versatility and its hardness proof consisting of a ...
Castryck, Wouter +2 more
core +3 more sources
On the condition number of the Vandermonde matrix of the nth cyclotomic polynomial
Recently, Blanco-Chacón proved the equivalence between the Ring Learning With Errors and Polynomial Learning With Errors problems for some families of cyclotomic number fields by giving some upper bounds for the condition number Cond(Vn) of the ...
Scala Antonio J. Di +2 more
doaj +1 more source
R-LWE-Based Distributed Key Generation and Threshold Decryption
Ever since the appearance of quantum computers, prime factoring and discrete logarithm-based cryptography have been questioned, giving birth to the so-called post-quantum cryptography.
Ferran Alborch +2 more
doaj +1 more source
The Ring Learning With Errors Problem: Spectral Distortion
We answer a question posed by Y. Elias et al. in [8] about possible spectral distortions of algebraic numbers. We provide a closed form for the spectral distortion of certain classes of cyclotomic polynomials. Moreover, we present a bound on the spectral distortion of cyclotomic polynomials.
Babinkostova, L. +4 more
openaire +2 more sources
The Structure Transfer Machine Theory and Applications [PDF]
Representation learning is a fundamental but challenging problem, especially when the distribution of data is unknown. We propose a new representation learning method, termed Structure Transfer Machine (STM), which enables feature learning process to ...
Han, Jungong +5 more
core +2 more sources
Homomorphic Encryption (HE) allows performing specific algebraic computations on encrypted data without the need for decryption. For this reason, HE is emerging as a strong privacy-preserving solution in cloud computing environments since it allows to ...
Stefano Di Matteo +2 more
doaj +1 more source
Graph Networks as a Universal Machine Learning Framework for Molecules and Crystals [PDF]
Graph networks are a new machine learning (ML) paradigm that supports both relational reasoning and combinatorial generalization. Here, we develop universal MatErials Graph Network (MEGNet) models for accurate property prediction in both molecules and ...
Chen, Chi +4 more
core +4 more sources
Post-quantum encryption technology based on BRLWE for internet of things
With the development of quantum computers, the classical public key encryption system is not capable enough to guarantee the communication security of internet of things (IoT).Because the mathematical puzzles which post-quantum encryption algorithms are ...
Yitian GAO, Liquan CHEN, Tianyang TU, Yuan GAO, Qianye CHEN
doaj +3 more sources
The Ring-LWE Problem in Lattice-Based Cryptography: The Case of Twisted Embeddings
Several works have characterized weak instances of the Ring-LWE problem by exploring vulnerabilities arising from the use of algebraic structures. Although these weak instances are not addressed by worst-case hardness theorems, enabling other ring ...
Jheyne N. Ortiz +4 more
doaj +1 more source

