Search Results - Learning with errors problem
-
1
Authors: et al.
Source: Involve, a Journal of Mathematics. 18:181-198
-
2
Authors: et al.
Source: Communications Physics, Vol 8, Iss 1, Pp 1-8 (2025)
Subject Terms: QB460-466, Physics, QC1-999, Astrophysics
-
3
-
4
Authors: et al.
Index Terms: Article, NonPeerReviewed, info:eu-repo/semantics/article
-
5
Authors: et al.
Source: Journal of Discrete Mathematical Sciences and Cryptography. 27:2573-2586
-
6
Authors: et al.
Source: Journal of Mathematical Cryptology, Vol 16, Iss 1, Pp 215-232 (2022)
Subject Terms: FOS: Computer and information sciences, 0301 basic medicine, 62a01, Computer Science - Information Theory, Information Theory (cs.IT), smearing, 0102 computer and information sciences, 11y16, 01 natural sciences, 11z05, ring learning with errors, coupon collector's problem, 03 medical and health sciences, 81p94, lattices, 06b05, QA1-939, 11t71, polynomial learning with errors, Mathematics, learning with errors
-
7
Authors: et al.
Subject Terms: Machine Learning, Cryptography and Security
Access URL: http://arxiv.org/abs/2510.08797
-
8
Authors: Jiankai Zhao
Source: Theoretical and Natural Science. 26:286-298
-
9
Authors: et al.
Source: Cybersecurity, Vol 8, Iss 1, Pp 1-17 (2025)
-
10
Authors:
Source: Journal on Mathematics Education. Jan 2018 9(1):121-128.
Peer Reviewed: Y
Page Count: 8
Descriptors: Mathematics Instruction, Teaching Methods, Grade 8, Junior High School Students, Foreign Countries, Quasiexperimental Design, Comparative Analysis, Control Groups, Experimental Groups, Mathematics Skills, Instructional Effectiveness, Constructivism (Learning), Experiential Learning, Concept Formation, Mathematical Concepts, Pretests Posttests
Geographic Terms: Indonesia
-
11
Authors:
Source: 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). :1084-1090
Subject Terms: FOS: Computer and information sciences, Computer Science - Cryptography and Security, Cryptography and Security (cs.CR)
Access URL: http://arxiv.org/abs/2501.07208
-
12
Authors: et al.
Source: The Computer Journal. 66:2974-2989
-
13
Authors: et al.
Index Terms: Electrical and Computer Engineering, ENGR, Cryptology, Cybersecurity, Post-quantum, Other
URL:
http://hdl.handle.net/1903/32507
Digital Repository at the University of Maryland
University of Maryland (College Park, Md)
Office of Undergraduate Research -
14
Authors:
Contributors:
Source: 2019 4th International Conference on Computer Science and Engineering (UBMK). :301-306
Subject Terms: Key Encapsulation Mechanishms, Post Quantum Cryptography, Matrix Vector Product, Learning With Errors
Access URL: http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=8907201
http://xplorestaging.ieee.org/ielx7/8892452/8906986/08907201.pdf?arnumber=8907201
https://avesis.deu.edu.tr/publication/details/baec13c4-4977-4826-87aa-07c8ee4361b7/oai
https://hdl.handle.net/20.500.12712/2322
https://doi.org/10.1109/UBMK.2019.8907201 -
15
Authors: et al.
Subject Terms: Quantum Physics, FOS: Physical sciences, Mathematical Physics (math-ph), Quantum Physics (quant-ph), Mathematical Physics
Access URL: http://arxiv.org/abs/2408.07936
-
16
Authors:
Source: Instructional Science: An International Journal of the Learning Sciences. Apr 2018 46(2):245-271.
Peer Reviewed: Y
Page Count: 27
-
17
Authors:
Source: Scientific Reports, Vol 14, Iss 1, Pp 1-11 (2024)
Subject Terms: Quantum algorithm, Quantum Fourier Transform, Learning with errors, Machine learning, Bernstein-Vazirani algorithm, Medicine, Science
File Description: electronic resource
Relation: https://doaj.org/toc/2045-2322
-
18
Source: Transactions on Computational and Applied Mathematics. 4
-
19
Authors: et al.
Source: Journal of Mathematical Cryptology, Vol 13, Iss 1, Pp 47-67 (2019)
Subject Terms: lwe, QA1-939, 0202 electrical engineering, electronic engineering, information engineering, lattice-based cryptography, 02 engineering and technology, learning with errors problem, 94a60, 11t71, post-quantum cryptography, Mathematics
File Description: text
Access URL: https://www.degruyter.com/downloadpdf/journals/jmc/13/1/article-p47.pdf
https://doaj.org/article/67dce5e0f6964e75991368795acb3c99
https://www.degruyter.com/document/doi/10.1515/jmc-2017-0040/html
https://tubiblio.ulb.tu-darmstadt.de/106127/
https://dblp.uni-trier.de/db/journals/jmc/jmc13.html#BindelBGS19
https://tuprints.ulb.tu-darmstadt.de/30176/3/10.1515_jmc-2017-0040.pdf -
20
Authors: et al.
Source: IEEE Access, Vol 7, Pp 155143-155157 (2019)
Subject Terms: Hash proof system, key encapsulation mechanism, key exchange, lattice-based cryptography, Electrical engineering. Electronics. Nuclear engineering, 0102 computer and information sciences, 01 natural sciences, learning with errors, TK1-9971
Nájsť tento článok vo Web of Science
Full Text Finder