Results 31 to 40 of about 243,777 (279)

True zero-training brain-computer interfacing: an online study [PDF]

open access: yes, 2014
Despite several approaches to realize subject-to-subject transfer of pre-trained classifiers, the full performance of a Brain-Computer Interface (BCI) for a novel user can only be reached by presenting the BCI system with data from the novel user.
Kindermans, Pieter-Jan   +4 more
core   +2 more sources

Lattice-Based proof of a shuffle [PDF]

open access: yes, 2019
In this paper we present the first fully post-quantum proof of a shuffle for RLWE encryption schemes. Shuffles are commonly used to construct mixing networks (mix-nets), a key element to ensure anonymity in many applications such as electronic voting ...
Costa, Nuria   +2 more
core   +1 more source

Non-Commutative Ring Learning With Errors From Cyclic Algebras

open access: yes, 2020
Full version of a paper previously posted on IACR ...
Grover, Charles   +2 more
openaire   +2 more sources

NTRU-type fully homomorphic encryption scheme without key switching

open access: yes网络与信息安全学报, 2017
In order to construct a fully homomorphic encryption scheme based on NTRU cryptosystem from ring learning with errors, noise growth and homomorphic property in the NTRU cryptosystem were analyzed. The con-cept of zero homomorphic encryption was introdced
Xin-xia SONG   +2 more
doaj   +3 more sources

Lattice-Based Group Signature with Message Recovery for Federal Learning

open access: yesApplied Sciences, 2023
Federal learning and privacy protection are inseparable. The participants in federated learning need to be the targets of privacy protection. On the other hand, federated learning can also be used as a tool for privacy attacks.
Yongli Tang   +3 more
doaj   +1 more source

Fast Number Theoretic Transform for Ring-LWE on 8-bit AVR Embedded Processor

open access: yesSensors, 2020
In this paper, we optimized Number Theoretic Transform (NTT) and random sampling operations on low-end 8-bit AVR microcontrollers. We focused on the optimized modular multiplication with secure countermeasure (i.e., constant timing), which ensures high ...
Hwajeong Seo   +6 more
doaj   +1 more source

Machine Learning-Based Models for the Estimation of the Energy Consumption in Metal Forming Processes

open access: yesMetals, 2021
This research provides an insight on the performances of machine learning (ML)-based algorithms for the estimation of the energy consumption in metal forming processes and is applied to the radial-axial ring rolling process.
Irene Mirandola   +5 more
doaj   +1 more source

Attacks on the Search-RLWE problem with small errors [PDF]

open access: yes, 2017
The Ring Learning-With-Errors (RLWE) problem shows great promise for post-quantum cryptography and homomorphic encryption. We describe a new attack on the non-dual search RLWE problem with small error widths, using ring homomorphisms to finite fields and
Chen, Hao   +2 more
core   +2 more sources

A New Algorithm for Solving Ring-LPN with a Reducible Polynomial [PDF]

open access: yes, 2014
The LPN (Learning Parity with Noise) problem has recently proved to be of great importance in cryptology. A special and very useful case is the RING-LPN problem, which typically provides improved efficiency in the constructed cryptographic primitive.
Guo, Qian   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy