Search Results - "Learning from errors"
-
1
Authors: et al.
Contributors: et al.
Source: Designs, Codes and Cryptography. 93:2947-2969
Subject Terms: FOS: Computer and information sciences, Abelian Number Fields, Computer Science - Cryptography and Security, Mathematics - Number Theory, Condition Number, Ring Learning With Errors, 11T71 (Primary), 94A60 (Secondary), Discrete Cosine Transform, Polynomial Learning With Errors, Fast Multiplication, FOS: Mathematics, Number-Theoretic Transform, Number Theory (math.NT), Cryptography and Security (cs.CR)
File Description: application/pdf
-
2
Authors: et al.
Contributors: et al.
Source: STOC '25: Proceedings of the 57th Annual ACM Symposium on Theory of Computing
Subject Terms: FOS: Computer and information sciences, Computer Science - Cryptography and Security, Discrete Mathematics (cs.DM), Mathematics - Statistics Theory, Tensor Completion, Statistics Theory (math.ST), Learning With Errors, Computational Complexity (cs.CC), Learning Parity With Noise, Reductions, Sparse Linear Equations, Computer Science - Computational Complexity, FOS: Mathematics, Cryptography and Security (cs.CR), Computer Science - Discrete Mathematics
File Description: application/application/pdf
-
3
Authors:
Source: Volume: 10, Issue: 130-52
Journal of Research in BusinessSubject Terms: Özyeterlilik, hatalardan öğrenme, iş yerinde hatalardan öğrenme, sosyal bilişsel kuram, özyeterlilik kuramı, Self-efficacy, learning from errors at work, learning from mistakes, social cognitive theory, self-efficacy theory, İşletme, Business Administration
File Description: application/pdf
-
4
Authors: et al.
Contributors: et al.
Source: Investigo. Repositorio Institucional de la Universidade de Vigo
Universidade de Vigo (UVigo)Subject Terms: FOS: Computer and information sciences, Computer Science - Cryptography and Security, 1203.08 Código y Sistemas de Codificación, Cyclotomic polynomials, Condition Number, Ring Learning with Errors, Number Theoretic Transforms, 3325 Tecnología de las Telecomunicaciones, Homomorphic Encryption, Cryptography and Security (cs.CR), 1203 Ciencia de Los Ordenadores, Polynomial Learning with Errors
File Description: application/pdf
-
5
Authors:
Source: Scientific Reports, Vol 15, Iss 1, Pp 1-11 (2025)
Subject Terms: Gaussian error sampler, Post-quantum cryptography (PQC), Learning with errors (LWE), SRAM (Static Random Access Memory), Medicine, Science
File Description: electronic resource
Relation: https://doaj.org/toc/2045-2322
-
6
Authors:
Source: Cybersecurity, Vol 8, Iss 1, Pp 1-16 (2025)
Subject Terms: Attribute-based encryption, Learning with errors, Cyclic algebra, Privacy preserving, Computer engineering. Computer hardware, TK7885-7895, Electronic computers. Computer science, QA75.5-76.95
File Description: electronic resource
Relation: https://doaj.org/toc/2523-3246
-
7
Authors: et al.
Source: Scientific Reports, Vol 15, Iss 1, Pp 1-14 (2025)
Subject Terms: Cloud computing, Public key encryption, Equality test, Lattice-based cryptography, Learning with errors, Medicine, Science
File Description: electronic resource
Relation: https://doaj.org/toc/2045-2322
-
8
Authors:
Source: British Journal of Educational Technology. 56:650-677
-
9
Authors: et al.
Source: Cybersecurity, Vol 8, Iss 1, Pp 1-17 (2025)
Subject Terms: Post-quantum cryptography, Learning with rounding problem, Learning with errors problem, The BKW algorithm, Computer engineering. Computer hardware, TK7885-7895, Electronic computers. Computer science, QA75.5-76.95
File Description: electronic resource
Relation: https://doaj.org/toc/2523-3246
-
10
Authors: et al.
Source: 56th Annual ACM Symposium on Theory of Computing (STOC), Vancouver, Canada PROCEEDINGS OF THE 56TH ANNUAL ACM SYMPOSIUM ON THEORY OF COMPUTING, STOC 2024. :1018-1026
Subject Terms: Complexity Theory, Delegated Quantum Computation, Learning With Errors, Nonlocality
File Description: electronic
-
11
Authors: et al.
Source: Huang, Y, Xu, G, Song, X & Xu, Y 2024, 'An Efficient RLWE-Based Privacy-Preserving Authentication Scheme Based on Edge Computing in Industrial Internet of Things', IEEE Transactions on Services Computing, vol. 17, no. 5, pp. 2012-2026. https://doi.org/10.1109/TSC.2024.3433534
-
12
RLWE/PLWE equivalence for the maximal totally real subextension of the $ 2^rpq $-th cyclotomic field
Authors:
Source: e_Buah Biblioteca Digital Universidad de Alcalá
instnameSubject Terms: Matemáticas, 4. Education, Ring learning with errors, Polynomial learning with errors, Distortion, Canonical embedding, Coefficient embedding, Condition number, Mathematics
File Description: application/pdf
-
13
Authors:
Source: Journal of Mathematical Cryptology, Vol 19, Iss 1, Pp p. 403-15 (2025)
Subject Terms: dual attack, learning with errors, lattices, cryptanalysis, 06b99, 94a60, Mathematics, QA1-939
File Description: electronic resource
Relation: https://doaj.org/toc/1862-2984
-
14
Authors: et al.
Source: Br J Educ Psychol
Subject Terms: learning from errors, secondary/high schools, 4. Education, contexts of learning, 16. Peace & justice, error, Article, 3. Good health, motivation, ddc:150, climate in the classroom, affective processes, 10. No inequality, metacognition, cognitive processes, learning environments
File Description: application/pdf
Access URL: https://pubmed.ncbi.nlm.nih.gov/38888062
https://madoc.bib.uni-mannheim.de/67491/
https://doi.org/10.1111/bjep.12697
https://opus.bibliothek.uni-augsburg.de/opus4/frontdoor/index/index/docId/113769
https://opus.bibliothek.uni-augsburg.de/opus4/files/113769/113769.pdf
https://doi.org/10.1111/bjep.12697
https://nbn-resolving.org/urn:nbn:de:bvb:384-opus4-1137692 -
15
An Efficient Lattice-Based Verifiable Public-Key Authenticated Encryption With Keyword Search Scheme
Authors:
Source: IEEE Access, Vol 13, Pp 205338-205352 (2025)
Subject Terms: Keyword guessing attack (KGA), lattice-based cryptography, middle-product learning with errors problem (MP-LWE), public key authenticated encryption with keyword search (PAEKS), random oracle model (RO), Electrical engineering. Electronics. Nuclear engineering, TK1-9971
File Description: electronic resource
-
16
Authors:
Source: IEEE Access, Vol 13, Pp 137603-137612 (2025)
Subject Terms: Post-quantum cryptography, ring learning with errors, lattice trapdoors, group key exchange, lattice re-encryption, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
File Description: electronic resource
-
17
Authors: et al.
Source: Proceedings of the CHI Conference on Human Factors in Computing Systems. :1-23
-
18
Authors:
Source: Signals, Vol 5, Iss 2, Pp 216-243 (2024)
Subject Terms: T57-57.97, Applied mathematics. Quantitative methods, lattices, lattice-based cryptosystems, 0202 electrical engineering, electronic engineering, information engineering, 0102 computer and information sciences, 02 engineering and technology, 01 natural sciences, post-quantum cryptography, learning with errors
-
19
Authors: et al.
Source: Mathematics, Vol 13, Iss 21, p 3373 (2025)
Subject Terms: private information retrieval, learning with errors, single server, Mathematics, QA1-939
File Description: electronic resource
-
20
Authors:
Source: Computer Networks and Communications.
Full Text Finder
Nájsť tento článok vo Web of Science