Results 61 to 70 of about 5,430 (195)

Privacy-preserving association rule mining via multi-key fully homomorphic encryption

open access: yesJournal of King Saud University: Computer and Information Sciences, 2023
Association rule mining is an efficient method to mine the association relationships between different items from large transaction databases, but is vulnerable to privacy leakage as operates over users’ sensitive data directly.
Peiheng Jia   +4 more
doaj   +1 more source

TAPAS : tricks to accelerate (encrypted) prediction as a service [PDF]

open access: yes, 2018
Machine learning methods are widely used for a variety of prediction problems. Prediction as a service is a paradigm in which service providers with technological expertise and computational resources may perform predictions for clients.
Gascon, Adria   +3 more
core  

Efficient Homomorphic Integer Computer from CKKS

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
As Fully Homomorphic Encryption (FHE) enables computation over encrypted data, it is a natural question of how efficiently it handles standard integer computations like 64-bit arithmetic.
Jaehyung Kim
doaj   +1 more source

Solid propellant rocket motor [PDF]

open access: yes, 1973
The characteristics of a solid propellant rocket engine with a controlled rate of thrust buildup to a desired thrust level are discussed. The engine uses a regressive burning controlled flow solid propellant igniter and a progressive burning main solid ...
Behm, J. W.   +3 more
core   +1 more source

Cryptanalysis of TFHE-Friendly Cipher FRAST

open access: yesIACR Transactions on Symmetric Cryptology
FRAST is a TFHE-friendly stream cipher that was published at FSE 2025. The cipher is defined over Z16, and makes extensive use of negacyclic S-boxes over Z16 as they are less costly in TFHE.
Antoine Bak   +5 more
doaj   +1 more source

Privacy-Preserving Tree-Based Inference with TFHE

open access: yes
Privacy enhancing technologies (PETs) have been proposed as a way to protect the privacy of data while still allowing for data analysis. In this work, we focus on Fully Homomorphic Encryption (FHE), a powerful tool that allows for arbitrary computations to be performed on encrypted data.
Frery, Jordan   +6 more
openaire   +2 more sources

Political Economy of Higher Education: South Africa in a comparative perspective [PDF]

open access: yes, 2011
Dr. Sanjiv Shrivastava is a Lecturer (Assistant Professor) of Physics, who teaches very large classes of nearly 1000 students at the university of the Witwatersrand. He has been using the ubiquitous smart phone technology to engage students and to impart
Shrivastava, Meenal
core  

Mass transfer accompanied with complete reversible chemical reactions in gas-liquid systems: an overview [PDF]

open access: yes, 1992
In many processes in the chemical industry mass transfer accompanied with reversible, complex chemical reactions in gas-liquid systems are frequently encountered.
Swaaij, W.P.M. van, Versteeg, G.F.
core   +6 more sources

Error-Simulatable Sanitization for TFHE and Applications

open access: yesIACR Communications in Cryptology
We show that the randomized TFHE bootstrapping technique of Bourse and Izabechène provides a form of sanitization which is error-simulatable. This means that the randomized bootstrap can be used not only for sanitization of ciphertexts (i.e. to hide the function that has been computed), but that it can also be used in server-assisted threshold ...
Nigel Smart, Michael Walter
openaire   +1 more source

Designing a General-Purpose 8-bit (T)FHE Processor Abstraction

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Making the most of TFHE programmable bootstrapping to evaluate functions or operators otherwise challenging to perform with only the native addition and multiplication of the scheme is a very active line of research.
Daphné Trama   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy