Suchergebnisse - learning with errors ((problem OR problemsys) OR (problemsssys OR problemsssys))
-
1
Autoren: et al.
Quelle: Involve, a Journal of Mathematics. 18:181-198
-
2
Autoren: et al.
Quelle: Communications Physics, Vol 8, Iss 1, Pp 1-8 (2025)
Schlagwörter: Astrophysics, QB460-466, Physics, QC1-999
Dateibeschreibung: electronic resource
Relation: https://doaj.org/toc/2399-3650
-
3
Autoren: Jiankai Zhao
Quelle: Theoretical and Natural Science. 26:286-298
-
4
Autoren: et al.
Quelle: Journal of Mathematical Cryptology, Vol 16, Iss 1, Pp 215-232 (2022)
Schlagwörter: FOS: Computer and information sciences, 0301 basic medicine, 62a01, Computer Science - Information Theory, Information Theory (cs.IT), smearing, 0102 computer and information sciences, 11y16, 01 natural sciences, 11z05, ring learning with errors, coupon collector's problem, 03 medical and health sciences, 81p94, lattices, 06b05, QA1-939, 11t71, polynomial learning with errors, Mathematics, learning with errors
-
5
Autoren: et al.
Quelle: Journal of Discrete Mathematical Sciences and Cryptography. 27:2573-2586
-
6
-
7
Autoren: et al.
Quelle: Cybersecurity, Vol 8, Iss 1, Pp 1-17 (2025)
-
8
Autoren: et al.
Index Begriffe: Article, NonPeerReviewed, info:eu-repo/semantics/article
-
9
Autoren: et al.
Schlagwörter: Machine Learning, Cryptography and Security
Zugangs-URL: http://arxiv.org/abs/2510.08797
-
10
Autoren:
Quelle: Journal on Mathematics Education. Jan 2018 9(1):121-128.
Peer Reviewed: Y
Page Count: 8
Descriptors: Mathematics Instruction, Teaching Methods, Grade 8, Junior High School Students, Foreign Countries, Quasiexperimental Design, Comparative Analysis, Control Groups, Experimental Groups, Mathematics Skills, Instructional Effectiveness, Constructivism (Learning), Experiential Learning, Concept Formation, Mathematical Concepts, Pretests Posttests
Geografische Kategorien: Indonesia
-
11
Autoren:
Quelle: 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). :1084-1090
Schlagwörter: FOS: Computer and information sciences, Computer Science - Cryptography and Security, Cryptography and Security (cs.CR)
Zugangs-URL: http://arxiv.org/abs/2501.07208
-
12
Autoren:
Weitere Verfasser:
Quelle: 2019 4th International Conference on Computer Science and Engineering (UBMK). :301-306
Schlagwörter: Key Encapsulation Mechanishms, Post Quantum Cryptography, Matrix Vector Product, Learning With Errors
Zugangs-URL: http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=8907201
http://xplorestaging.ieee.org/ielx7/8892452/8906986/08907201.pdf?arnumber=8907201
https://avesis.deu.edu.tr/publication/details/baec13c4-4977-4826-87aa-07c8ee4361b7/oai
https://hdl.handle.net/20.500.12712/2322
https://doi.org/10.1109/UBMK.2019.8907201 -
13
Autoren: et al.
Quelle: The Computer Journal. 66:2974-2989
-
14
Autoren:
Quelle: Instructional Science: An International Journal of the Learning Sciences. Apr 2018 46(2):245-271.
Peer Reviewed: Y
Page Count: 27
-
15
Autoren: et al.
Index Begriffe: Electrical and Computer Engineering, ENGR, Cryptology, Cybersecurity, Post-quantum, Other
URL:
http://hdl.handle.net/1903/32507
Digital Repository at the University of Maryland
University of Maryland (College Park, Md)
Office of Undergraduate Research -
16
Autoren:
Quelle: Scientific Reports, Vol 14, Iss 1, Pp 1-11 (2024)
Schlagwörter: Quantum algorithm, Quantum Fourier Transform, Learning with errors, Machine learning, Bernstein-Vazirani algorithm, Medicine, Science
Dateibeschreibung: electronic resource
Relation: https://doaj.org/toc/2045-2322
-
17
Autoren: et al.
Schlagwörter: Quantum Physics, FOS: Physical sciences, Mathematical Physics (math-ph), Quantum Physics (quant-ph), Mathematical Physics
Zugangs-URL: http://arxiv.org/abs/2408.07936
-
18
Autoren: et al.
Quelle: Journal of Mathematical Cryptology, Vol 13, Iss 1, Pp 47-67 (2019)
Schlagwörter: lwe, QA1-939, 0202 electrical engineering, electronic engineering, information engineering, lattice-based cryptography, 02 engineering and technology, learning with errors problem, 94a60, 11t71, post-quantum cryptography, Mathematics
Dateibeschreibung: text
Zugangs-URL: https://www.degruyter.com/downloadpdf/journals/jmc/13/1/article-p47.pdf
https://doaj.org/article/67dce5e0f6964e75991368795acb3c99
https://www.degruyter.com/document/doi/10.1515/jmc-2017-0040/html
https://tubiblio.ulb.tu-darmstadt.de/106127/
https://dblp.uni-trier.de/db/journals/jmc/jmc13.html#BindelBGS19
https://tuprints.ulb.tu-darmstadt.de/30176/3/10.1515_jmc-2017-0040.pdf -
19
Quelle: Transactions on Computational and Applied Mathematics. 4
-
20
Autoren: et al.
Quelle: IEEE Access, Vol 7, Pp 155143-155157 (2019)
Schlagwörter: Hash proof system, key encapsulation mechanism, key exchange, lattice-based cryptography, Electrical engineering. Electronics. Nuclear engineering, 0102 computer and information sciences, 01 natural sciences, learning with errors, TK1-9971
Nájsť tento článok vo Web of Science
Full Text Finder