咨询与建议

限定检索结果

文献类型

  • 104 篇 期刊文献
  • 102 篇 会议

馆藏范围

  • 206 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 193 篇 工学
    • 178 篇 计算机科学与技术...
    • 46 篇 电气工程
    • 31 篇 信息与通信工程
    • 23 篇 软件工程
    • 7 篇 电子科学与技术(可...
    • 6 篇 网络空间安全
    • 4 篇 控制科学与工程
    • 2 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 航空宇航科学与技...
    • 1 篇 生物医学工程(可授...
  • 57 篇 理学
    • 53 篇 数学
    • 4 篇 物理学
    • 2 篇 化学
    • 2 篇 生物学
    • 2 篇 系统科学
  • 8 篇 管理学
    • 8 篇 管理科学与工程(可...
  • 3 篇 法学
    • 3 篇 法学
  • 3 篇 军事学
    • 3 篇 军队指挥学
  • 1 篇 教育学
    • 1 篇 教育学
    • 1 篇 心理学(可授教育学...
  • 1 篇 医学
    • 1 篇 临床医学

主题

  • 206 篇 learning with er...
  • 27 篇 lattice-based cr...
  • 22 篇 lattices
  • 17 篇 homomorphic encr...
  • 17 篇 fully homomorphi...
  • 17 篇 post-quantum cry...
  • 14 篇 lattice
  • 11 篇 cryptography
  • 10 篇 lwe
  • 10 篇 identity-based e...
  • 8 篇 attribute-based ...
  • 7 篇 standard model
  • 7 篇 learning with ro...
  • 7 篇 equality test
  • 7 篇 key exchange
  • 6 篇 cryptanalysis
  • 6 篇 proxy re-encrypt...
  • 6 篇 encryption
  • 5 篇 public-key encry...
  • 5 篇 cloud computing

机构

  • 11 篇 chinese acad sci...
  • 8 篇 univ wollongong ...
  • 8 篇 univ chinese aca...
  • 6 篇 chinese acad sci...
  • 5 篇 univ chinese aca...
  • 5 篇 beijing univ pos...
  • 5 篇 xidian univ stat...
  • 5 篇 stanford univ st...
  • 4 篇 chongqing univ c...
  • 4 篇 harbin engn univ...
  • 4 篇 westone cryptol ...
  • 3 篇 technol innovat ...
  • 3 篇 csiro data61 nsw
  • 3 篇 seoul natl univ
  • 3 篇 hangzhou normal ...
  • 3 篇 tsinghua univ de...
  • 3 篇 ntt res sunnyval...
  • 3 篇 peking univ sch ...
  • 3 篇 jinan univ coll ...
  • 3 篇 iran univ sci & ...

作者

  • 11 篇 susilo willy
  • 8 篇 dung hoang duong
  • 7 篇 wang kunpeng
  • 7 篇 wang fuqun
  • 7 篇 lu xianhui
  • 7 篇 li bao
  • 5 篇 vaikuntanathan v...
  • 5 篇 chen kefei
  • 5 篇 roy partha sarat...
  • 5 篇 song yongsoo
  • 5 篇 kiyomoto shinsak...
  • 5 篇 fukushima kazuhi...
  • 4 篇 li zengpeng
  • 4 篇 dutta priyanka
  • 4 篇 weng jian
  • 4 篇 hu yupu
  • 4 篇 regev oded
  • 4 篇 cheon jung hee
  • 4 篇 ma chunguang
  • 3 篇 waters brent

语言

  • 204 篇 英文
  • 2 篇 中文
检索条件"主题词=Learning with errors"
206 条 记 录,以下是31-40 订阅
排序:
Bootstrapping Optimization Techniques for the FINAL Fully Homomorphic Encryption Scheme
收藏 引用
INFORMATION 2025年 第3期16卷 200-200页
作者: Wu, Meng Zhao, Xiufeng Song, Weitao Informat Engn Univ Coll Cryptog Engn Zhengzhou 450001 Peoples R China
With the advent of cloud computing and the era of big data, there is an increasing focus on privacy computing. Consequently, homomorphic encryption, being a primary technique for achieving privacy computing, is held i... 详细信息
来源: 评论
Adaptive Hardcore Bit and Quantum Key Leasing over Classical Channel from LWE with Polynomial Modulus  30th
Adaptive Hardcore Bit and Quantum Key Leasing over Classical...
收藏 引用
30th International Conference on the Theory and Application of Cryptology and Information Security
作者: Duong Hieu Phan Wen, Weiqiang Yan, Xingyu Zheng, Jinwei Telecom Paris LTCI Inst Polytech Paris Paris France Beijing Univ Posts & Telecommun State Key Lab Networking & Switching Technol Beijing 100876 Peoples R China
Quantum key leasing, also known as public key encryption with secure key leasing (PKE-SKL), allows a user to lease a (quantum) secret key to a server for decryption purpose, with the capability of revoking the key aft... 详细信息
来源: 评论
A Compact Multi-Identity Fully Homomorphic Encryption Scheme Without Fresh Ciphertexts
收藏 引用
APPLIED SCIENCES-BASEL 2025年 第1期15卷 473-473页
作者: Wang, Ziwei Huang, Ruwei Wei, Xiyi Guangxi Univ Sch Comp & Elect Informat Nanning 530004 Peoples R China
The lattice-based multi-identity fully homomorphic encryption scheme combines the quantum security of lattice cryptography with the advantage of identity-based encryption. However, existing schemes face challenges suc... 详细信息
来源: 评论
Implementing Homomorphic Encryption-Based Logic Locking in System-On-Chip Designs
收藏 引用
IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS 2025年
作者: Ye, Ziyang Ikeda, Makoto Univ Tokyo Grad Sch Engn Dept Elect Engn & Informat Syst Tokyo 1138656 Japan
This study presents a logic-locking scheme based on the binary ring learning with error (bin-RLWE) algorithm, implemented in a reduced instruction set computer-five (RISC-V) system-on-chip (SoC) design. Unlike traditi... 详细信息
来源: 评论
The informativeness of the gradient revisited
收藏 引用
Neural Networks 2025年 189卷 107517页
作者: Takhanov, Rustem Department of Mathematics Nazarbayev University 53 Kabanbay Batyr Ave. Astana010000 Kazakhstan
In the past decade gradient-based deep learning has revolutionized several applications. However, this rapid advancement has highlighted the need for a deeper theoretical understanding of its limitations. Research has... 详细信息
来源: 评论
Leveled Homomorphic Encryption in Certificateless Cryptosystem
收藏 引用
Chinese Journal of Electronics 2017年 第6期26卷 1213-1220页
作者: CHEN Hu HU Yupu LIAN Zhizhu State Key Laboratory of Integrated Service Networks Xidian University Jiangsu Key Laboratory of Education Big Data Science and Engineering Jiangsu Normal University
To lower communication complexity, a Certificateless homomorphic encryption(CLHE) scheme based on the learning with errors(LWE) problem is constructed by introducing a new technique called probabilistic encoding with ... 详细信息
来源: 评论
An Automatic Analysis Approach Toward Indistinguishability of Sampling on the LWE Problem
收藏 引用
Tsinghua Science and Technology 2020年 第5期25卷 553-563页
作者: Shuaishuai Zhu Yiliang Han Xiaoyuan Yang the College of Cryptography Engineering Engineering University of People's Armed PoliceXi'an 710086China the Key Laboratory of Network and Information Security under the People's Armed Police Engineering University of People's Armed PoliceXi'an 710086China
learning with errors (LWE) is one of the Non-Polynomial (NP)-hard problems applied in cryptographic primitives against quantum ***,the security and efficiency of schemes based on LWE are closely affected by the error ... 详细信息
来源: 评论
Lattice-based autonomous path proxy re-encryption in the standard model
收藏 引用
Science China(Information Sciences) 2023年 第10期66卷 184-195页
作者: Wenli XIE Jian WENG Yao TONG Xiaojian LIANG Lisha YAO Feixiang ZHAO College of Cyber Security Jinan University Guangzhou Fongwell Data Limited Company
Autonomous path proxy re-encryption(AP-PRE) is a type of PRE that implements control on the delegation path in a multi-hop PRE. AP-PRE forces the proxy to perform the transformation along a predefined path without rev... 详细信息
来源: 评论
On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2015年 第8期10卷 1643-1655页
作者: Asghar, Hassan Jameel Steinfeld, Ron Li, Shujun Kaafar, Mohamed Ali Pieprzyk, Josef Natl ICT Australia Sydney NSW 2015 Australia Monash Univ Fac Informat Technol Clayton Sch Informat Technol Clayton Vic 3800 Australia Univ Surrey Fac Engn & Phys Sci Dept Comp Guildford GU2 7XH Surrey England Queensland Univ Technol Fac Sci & Engn Sch Elect Engn & Comp Sci Brisbane Qld 4000 Australia
Human identification protocols are challenge-response protocols that rely on human computational ability to reply to random challenges from the server based on a public function of a shared secret and the challenge to... 详细信息
来源: 评论
Leveled Fully Homomorphic Signcryption From Lattices
收藏 引用
IEEE ACCESS 2023年 11卷 35232-35242页
作者: Jin, Xiaodan Wang, Fuqun Zhang, Renjun Lian, Bin Chen, Kefei Hangzhou Normal Univ Sch Math Hangzhou 311121 Peoples R China Hangzhou Normal Univ Key Lab Cryptog Zhejiang Prov Hangzhou 311121 Peoples R China NingboTech Univ Sch Informat Sci & Engn Ningbo 315199 Peoples R China
With the continuous and rapid development of Cloud Computing, Big Data and Internet of Things, it is extremely critical to protect data with homomorphism, privacy and integrity. For this, Rezaeibagha et al. proposed a... 详细信息
来源: 评论