Search Results - "Learning with errors problem"
-
1
Authors: et al.
Source: Involve, a Journal of Mathematics. 18:181-198
-
2
Authors: et al.
Source: Communications Physics, Vol 8, Iss 1, Pp 1-8 (2025)
Subject Terms: QB460-466, Physics, QC1-999, Astrophysics
-
3
Authors: et al.
Source: Journal of Discrete Mathematical Sciences and Cryptography. 27:2573-2586
-
4
Authors: et al.
Index Terms: Article, NonPeerReviewed, info:eu-repo/semantics/article
-
5
-
6
Authors: et al.
Subject Terms: Machine Learning, Cryptography and Security
Access URL: http://arxiv.org/abs/2510.08797
-
7
Authors:
Source: 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). :1084-1090
Subject Terms: FOS: Computer and information sciences, Computer Science - Cryptography and Security, Cryptography and Security (cs.CR)
Access URL: http://arxiv.org/abs/2501.07208
-
8
Authors: et al.
Source: The Computer Journal. 66:2974-2989
-
9
Authors: et al.
Subject Terms: Quantum Physics, FOS: Physical sciences, Mathematical Physics (math-ph), Quantum Physics (quant-ph), Mathematical Physics
Access URL: http://arxiv.org/abs/2408.07936
-
10
Source: Transactions on Computational and Applied Mathematics. 4
-
11
Authors: et al.
Source: Journal of Mathematical Cryptology, Vol 16, Iss 1, Pp 215-232 (2022)
Subject Terms: FOS: Computer and information sciences, 0301 basic medicine, 62a01, Computer Science - Information Theory, Information Theory (cs.IT), smearing, 0102 computer and information sciences, 11y16, 01 natural sciences, 11z05, ring learning with errors, coupon collector's problem, 03 medical and health sciences, 81p94, lattices, 06b05, QA1-939, 11t71, polynomial learning with errors, Mathematics, learning with errors
-
12
Authors: et al.
Source: Journal of Mathematical Cryptology, Vol 13, Iss 1, Pp 47-67 (2019)
Subject Terms: lwe, QA1-939, 0202 electrical engineering, electronic engineering, information engineering, lattice-based cryptography, 02 engineering and technology, learning with errors problem, 94a60, 11t71, post-quantum cryptography, Mathematics
File Description: text
Access URL: https://www.degruyter.com/downloadpdf/journals/jmc/13/1/article-p47.pdf
https://doaj.org/article/67dce5e0f6964e75991368795acb3c99
https://www.degruyter.com/document/doi/10.1515/jmc-2017-0040/html
https://tubiblio.ulb.tu-darmstadt.de/106127/
https://dblp.uni-trier.de/db/journals/jmc/jmc13.html#BindelBGS19
https://tuprints.ulb.tu-darmstadt.de/30176/3/10.1515_jmc-2017-0040.pdf -
13
Authors: et al.
Index Terms: Electrical and Computer Engineering, ENGR, Cryptology, Cybersecurity, Post-quantum, Other
URL:
http://hdl.handle.net/1903/32507
Digital Repository at the University of Maryland
University of Maryland (College Park, Md)
Office of Undergraduate Research -
14
Authors:
Source: ANTS-XIV, Fourteenth Algorithmic Number Theory Symposium, Proceedings
Subject Terms: Mathematics and Statistics, 0202 electrical engineering, electronic engineering, information engineering, 0102 computer and information sciences, 02 engineering and technology, 01 natural sciences
File Description: application/pdf
Access URL: https://msp.org/obs/2020/4-1/obs-v4-n1-p05-s.pdf
https://msp.org/obs/2020/4-1/p05.xhtml
https://biblio.ugent.be/publication/8665551/file/8665555.pdf
https://biblio.ugent.be/publication/8665551
https://msp.org/obs/2020/4-1/obs-v4-n1-p05-s.pdf
https://biblio.ugent.be/publication/8665551
http://hdl.handle.net/1854/LU-8665551
https://biblio.ugent.be/publication/8665551/file/8665555 -
15
Authors:
Contributors:
Source: 2019 4th International Conference on Computer Science and Engineering (UBMK). :301-306
Subject Terms: Key Encapsulation Mechanishms, Post Quantum Cryptography, Matrix Vector Product, Learning With Errors
Access URL: http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=8907201
http://xplorestaging.ieee.org/ielx7/8892452/8906986/08907201.pdf?arnumber=8907201
https://avesis.deu.edu.tr/publication/details/baec13c4-4977-4826-87aa-07c8ee4361b7/oai
https://hdl.handle.net/20.500.12712/2322
https://doi.org/10.1109/UBMK.2019.8907201 -
16
Authors:
Source: Advances in Mathematics of Communications. 14:573-577
Subject Terms: 02 engineering and technology, 0210 nano-technology, 01 natural sciences, 0104 chemical sciences
Access URL: https://www.aimsciences.org/article/exportPdf?id=21e23770-7ce5-43bf-b8b9-f109ed67175f
https://www.aimsciences.org/article/exportPdf?id=b7e7fd73-09d4-460a-84e5-e539ca770af5
https://www.aimsciences.org/article/doi/10.3934/amc.2020014
https://www.aimsciences.org/article/exportPdf?id=21e23770-7ce5-43bf-b8b9-f109ed67175f
https://dblp.uni-trier.de/db/journals/amco/amco14.html#DingDS20
https://doi.org/10.3934/amc.2020030 -
17
Authors: et al.
Source: Entropy, Vol 26, Iss 9, p 729 (2024)
Subject Terms: lattice cryptography, encryption of policy attributes, identity authentication, Lenstra–Lenstra–Lovász lattice reduction algorithm, Science, Astrophysics, QB460-466, Physics, QC1-999
File Description: electronic resource
-
18
Authors: et al.
Contributors: et al.
Source: Lecture Notes in Computer Science ISBN: 9783030752446
Public-Key Cryptography – PKC 2021-24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part I
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Public-Key Cryptography – PKC 2021Subject Terms: 0202 electrical engineering, electronic engineering, information engineering, 0102 computer and information sciences, 02 engineering and technology, [INFO] Computer Science [cs], 01 natural sciences
Access URL: https://hal.science/hal-03475737v1
https://doi.org/10.1007/978-3-030-75245-3_8
https://research.monash.edu/en/publications/on-the-integer-polynomial-learning -with-errors -problem
http://doi.org/10.1007/978-3-030-75245-3_8
https://eprint.iacr.org/2021/277
https://link.springer.com/chapter/10.1007/978-3-030-75245-3_8
https://dblp.uni-trier.de/db/journals/iacr/iacr2021.html#DeveveySSS21
https://rd.springer.com/chapter/10.1007/978-3-030-75245-3_8 -
19
Authors: et al.
Source: IEEE Access, Vol 7, Pp 155143-155157 (2019)
Subject Terms: Hash proof system, key encapsulation mechanism, key exchange, lattice-based cryptography, Electrical engineering. Electronics. Nuclear engineering, 0102 computer and information sciences, 01 natural sciences, learning with errors, TK1-9971
-
20
Authors: et al.
Source: Quantum Information Processing. 21
Nájsť tento článok vo Web of Science
Full Text Finder