Results 41 to 50 of about 243,777 (279)
Once the shared secret key is established, three parties can use it for secure communication using symmetric-key encryption AES (128, 192, 256) algorithms or other cryptographic primitives.
Dharminder Chaudhary +5 more
doaj +1 more source
Shorter Linkable Ring Signature Based on Middle-Product Learning with Errors Problem
Abstract DualRing is a novel generic construction introduced by Yuen et al. (CRYPTO’21), which can transform a special kind of (Type-T*) canonical identification scheme to a ring signature scheme. Compared with the classical approaches, this method can get a shorter signature.
Hao Lin +4 more
openaire +1 more source
Most previous RLWE-based multi-key homomorphic encryptions (MKHEs) need to perform complex relinearization operations on ciphertext products to complete the evaluation of circuits of bounded polynomial depth.
Xiaoliang Che +6 more
doaj +1 more source
LocNet: Global localization in 3D point clouds for mobile vehicles
Global localization in 3D point clouds is a challenging problem of estimating the pose of vehicles without any prior knowledge. In this paper, a solution to this problem is presented by achieving place recognition and metric pose estimation in the global
Ding, Xiaqing +4 more
core +1 more source
Status of the Muon (g-2) Experiment [PDF]
The status of the muon (g-2) experiment, E821 at the Brookhaven AGS, is given. A new result with a precision of 5 parts per million has been obtained with direct muon injection into the ring and is presented. The theoretical motivation for the experiment,
Roberts, B. Lee
core +4 more sources
Dietary Protein Intake and Peritoneal Protein Losses in Peritoneal Dialysis Patients
ABSTRACT Introduction Peritoneal dialysis (PD) patients lose protein in their waste dialysate, potentially increasing their risk for malnutrition. We wished to determine whether there was any association between losses and dietary protein intake (DPI). Methods DPI was assessed from 24‐h dietary recall using Nutrics software.
Haalah Shaaker, Andrew Davenport
wiley +1 more source
Provable security signcryption scheme based on RLWE without trapdoor
In view of the existing efficiency and security problems of lattice based signcryption,with the ABB16’s signature scheme ring-TESLA,a signcryption scheme without trapdoor named RLWE-SC was constructed,which achieved indistinguish ability against adaptive
Zhen LIU +3 more
doaj +2 more sources
Aldehyde dehydrogenase 1A1 (ALDH1A1) is a cancer stem cell marker in several malignancies. We established a novel epithelial cell line from rectal adenocarcinoma with unique overexpression of this enzyme. Genetic attenuation of ALDH1A1 led to increased invasive capacity and metastatic potential, the inhibition of proliferation activity, and ultimately ...
Martina Poturnajova +25 more
wiley +1 more source
A study of factors related to primary grade spelling: correlations of factors studied. [PDF]
Thesis (Ed.M.)--Boston ...
Conway, Virginia +6 more
core +1 more source
Bayesian Approach for Linear Optics Correction
With a Bayesian approach, the linear optics correction algorithm for storage rings is revisited. Starting from the Bayes' theorem, a complete linear optics model is simplified as "likelihood functions" and "prior probability distributions".
Cheng, Weixing +2 more
core +1 more source

