Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    EVFLR: Efficient Vertical Federated Logistic Regression Based on Batch Operations

    Vertical federated learning (VFL), where multiple participants with non-overlap** features for the same set of instances jointly train models, plays an increasingly important role in federated learning. This...

    Dong Chen, Zhiyuan Qiu, Guangwu Xu in Information Security and Cryptology (2024)

  2. No Access

    Article

    Lattice-Based Cryptography: A Survey

    Most of current public key cryptosystems would be vulnerable to the attacks of the future quantum computers. Post-quantum cryptography offers mathematical methods to secure information and communications again...

    **aoyun Wang, Guangwu Xu, Yang Yu in Chinese Annals of Mathematics, Series B (2023)

  3. No Access

    Chapter and Conference Paper

    Improvements of Homomorphic Secure Evaluation of Inverse Square Root

    Secure machine learning has attracted much attention recently. The celebrated CKKS homomorphic encryption scheme has played a key role in such an application. Inverse square root is widely used in machine lear...

    Hongyuan Qu, Guangwu Xu in Information and Communications Security (2023)

  4. No Access

    Chapter and Conference Paper

    On the Measurement and Simulation of the BKZ Behavior for q-ary Lattices

    The BKZ algorithm has been one of the most important tools for analyzing and assessing lattice-based cryptosystems. The second order statistical behavior of BKZ algorithm on random lattices has been well measu...

    Zishen Zhao, Guangwu Xu in Information Security and Cryptology (2023)

  5. No Access

    Chapter and Conference Paper

    More Accurate Geometric Analysis on the Impact of Successful Decryptions for IND-CCA Secure Ring/Mod-LWE/LWR Based Schemes

    Majority of lattice-based encryption schemes allow the possibility of decryption failures. It is now understood that this property makes such encryption systems susceptible to the so-called decryption failure ...

    Han Wu, Guangwu Xu in Topics in Cryptology – CT-RSA 2022 (2022)

  6. No Access

    Article

    Discrete Gaussian measures and new bounds of the smoothing parameter for lattices

    In this paper, we start with a discussion of discrete Gaussian measures on lattices. Several results of Banaszczyk are analyzed, a simple form of uncertainty principle for discrete Gaussian measure is formulat...

    Zhongxiang Zheng, Chunhuan Zhao, Guangwu Xu in Applicable Algebra in Engineering, Communi… (2021)

  7. No Access

    Article

    Error estimation of practical convolution discrete Gaussian sampling with rejection sampling

    Zhongxiang Zheng, **aoyun Wang, Guangwu Xu in Science China Information Sciences (2021)

  8. Chapter and Conference Paper

    Pre-computation Scheme of Window \(\tau \) NAF for Koblitz Curves Revisited

    Let \(E_a/ \mathbb {F}_{2}: y^2+xy=x^3+ax^2+1\) ...

    Wei Yu, Guangwu Xu in Advances in Cryptology – EUROCRYPT 2021 (2021)

  9. Article

    Prevention of tuberculosis in rhesus macaques by a cytomegalovirus-based vaccine

    Complete vaccine-mediated immune control of highly pathogenic Mycobacterium tuberculosis is possible if immune effector responses can intercept the infection at its earliest stages.

    Scott G Hansen, Daniel E Zak, Guangwu Xu, Julia C Ford, Emily E Marshall in Nature Medicine (2018)

  10. No Access

    Article

    Orthogonalized lattice enumeration for solving SVP

    The orthogonalized integer representation was independently proposed by Ding et al. using genetic algorithm and Fukase et al. using sampling technique to solve shortest vector problem (SVP). Their results are ...

    Zhongxiang Zheng, **aoyun Wang, Guangwu Xu, Yang Yu in Science China Information Sciences (2018)

  11. No Access

    Chapter and Conference Paper

    On Solving a Generalized Chinese Remainder Theorem in the Presence of Remainder Errors

    In estimating frequencies given that the signal waveforms are undersampled multiple times, **a et al. proposed to use a generalized version of Chinese remainder Theorem (CRT), where the moduli are ...

    Guangwu Xu in Geometry, Algebra, Number Theory, and Thei… (2018)

  12. Article

    Addendum: Immune clearance of highly pathogenic SIV infection

    Scott G. Hansen, Michael Piatak, Abigail B. Ventura, Colette M. Hughes in Nature (2017)

  13. No Access

    Chapter and Conference Paper

    TIM: A Trust Insurance Mechanism for Network Function Virtualization Based on Trusted Computing

    As a new network architecture and key technology of 5G, Network Function Virtualization (NFV) is paid special attention in both industry and academia. In the context of NFV, Virtualized Network Functions (VNFs...

    Guangwu Xu, Yankun Tang, Zheng Yan in Security, Privacy, and Anonymity in Comput… (2017)

  14. No Access

    Chapter and Conference Paper

    Fast Scalar Multiplication for Elliptic Curves over Binary Fields by Efficiently Computable Formulas

    This paper considers efficient scalar multiplication of elliptic curves over binary fields with a twofold purpose. Firstly, we derive the most efficient 3P formula in

    Saud Al Musa, Guangwu Xu in Progress in Cryptology – INDOCRYPT 2017 (2017)

  15. Chapter and Conference Paper

    Provably Secure NTRU Instances over Prime Cyclotomic Rings

    Due to its remarkable performance and potential resistance to quantum attacks, \(\mathsf {NTRUEncrypt}\) ha...

    Yang Yu, Guangwu Xu, **aoyun Wang in Public-Key Cryptography – PKC 2017 (2017)

  16. Chapter and Conference Paper

    Conditional Cube Attack on Reduced-Round Keccak Sponge Function

    The security analysis of Keccak, the winner of SHA-3, has attracted considerable interest. Recently, some attention has been paid to the analysis of keyed modes of Keccak sponge function. As a notable example,...

    Senyang Huang, **aoyun Wang, Guangwu Xu in Advances in Cryptology – EUROCRYPT 2017 (2017)

  17. No Access

    Article

    Dynamics of linear systems over finite commutative rings

    The dynamics of a linear dynamical system over a finite field can be described by using the elementary divisors of the corresponding matrix. It is natural to extend the investigation to a general finite commut...

    Yangjiang Wei, Guangwu Xu, Yi Ming Zou in Applicable Algebra in Engineering, Communi… (2016)

  18. Article

    Correction: Corrigendum: Immune clearance of highly pathogenic SIV infection

    Nature 502, 100–104 (2013); doi:10.1038/nature12519 The Acknowledgements section of this Letter should have included the following sentence: “We acknowledge the contribution of M. A. Jarvis to the design, cons...

    Scott G. Hansen, Michael Piatak, Abigail B. Ventura, Colette M. Hughes in Nature (2014)

  19. No Access

    Article

    A polynomial time algorithm for GapCVPP in l 1 norm

    This paper concerns the hardness of approximating the closest vector in a lattice with preprocessing in l 1 norm, and gives a polynomial time algorithm for GapCVPPγ in l 1 norm wit...

    ChengLiang Tian, LiDong Han, GuangWu Xu in Science China Information Sciences (2014)

  20. Article

    On the 1-Norm Invariant Convex k-Sparse Decomposition of Signals

    Inspired by an interesting idea of Cai and Zhang, we formulate and prove the convex k-sparse decomposition of vectors that is invariant with respect to the 1 norm. This result fits well in discu...

    Guangwu Xu, Zhiqiang Xu in Journal of the Operations Research Society of China (2013)

previous disabled Page of 2