-
Chapter and Conference Paper
EVFLR: Efficient Vertical Federated Logistic Regression Based on Batch Operations
Vertical federated learning (VFL), where multiple participants with non-overlap** features for the same set of instances jointly train models, plays an increasingly important role in federated learning. This...
-
Article
Lattice-Based Cryptography: A Survey
Most of current public key cryptosystems would be vulnerable to the attacks of the future quantum computers. Post-quantum cryptography offers mathematical methods to secure information and communications again...
-
Chapter and Conference Paper
Improvements of Homomorphic Secure Evaluation of Inverse Square Root
Secure machine learning has attracted much attention recently. The celebrated CKKS homomorphic encryption scheme has played a key role in such an application. Inverse square root is widely used in machine lear...
-
Chapter and Conference Paper
On the Measurement and Simulation of the BKZ Behavior for q-ary Lattices
The BKZ algorithm has been one of the most important tools for analyzing and assessing lattice-based cryptosystems. The second order statistical behavior of BKZ algorithm on random lattices has been well measu...
-
Chapter and Conference Paper
More Accurate Geometric Analysis on the Impact of Successful Decryptions for IND-CCA Secure Ring/Mod-LWE/LWR Based Schemes
Majority of lattice-based encryption schemes allow the possibility of decryption failures. It is now understood that this property makes such encryption systems susceptible to the so-called decryption failure ...
-
Article
Discrete Gaussian measures and new bounds of the smoothing parameter for lattices
In this paper, we start with a discussion of discrete Gaussian measures on lattices. Several results of Banaszczyk are analyzed, a simple form of uncertainty principle for discrete Gaussian measure is formulat...
-
Article
Error estimation of practical convolution discrete Gaussian sampling with rejection sampling
-
Chapter and Conference Paper
Pre-computation Scheme of Window \(\tau \) NAF for Koblitz Curves Revisited
Let \(E_a/ \mathbb {F}_{2}: y^2+xy=x^3+ax^2+1\) ...
-
Article
Prevention of tuberculosis in rhesus macaques by a cytomegalovirus-based vaccine
Complete vaccine-mediated immune control of highly pathogenic Mycobacterium tuberculosis is possible if immune effector responses can intercept the infection at its earliest stages.
-
Article
Orthogonalized lattice enumeration for solving SVP
The orthogonalized integer representation was independently proposed by Ding et al. using genetic algorithm and Fukase et al. using sampling technique to solve shortest vector problem (SVP). Their results are ...
-
Chapter and Conference Paper
On Solving a Generalized Chinese Remainder Theorem in the Presence of Remainder Errors
In estimating frequencies given that the signal waveforms are undersampled multiple times, **a et al. proposed to use a generalized version of Chinese remainder Theorem (CRT), where the moduli are ...
-
Article
Addendum: Immune clearance of highly pathogenic SIV infection
-
Chapter and Conference Paper
TIM: A Trust Insurance Mechanism for Network Function Virtualization Based on Trusted Computing
As a new network architecture and key technology of 5G, Network Function Virtualization (NFV) is paid special attention in both industry and academia. In the context of NFV, Virtualized Network Functions (VNFs...
-
Chapter and Conference Paper
Fast Scalar Multiplication for Elliptic Curves over Binary Fields by Efficiently Computable Formulas
This paper considers efficient scalar multiplication of elliptic curves over binary fields with a twofold purpose. Firstly, we derive the most efficient 3P formula in
-
Chapter and Conference Paper
Provably Secure NTRU Instances over Prime Cyclotomic Rings
Due to its remarkable performance and potential resistance to quantum attacks, \(\mathsf {NTRUEncrypt}\) ha...
-
Chapter and Conference Paper
Conditional Cube Attack on Reduced-Round Keccak Sponge Function
The security analysis of Keccak, the winner of SHA-3, has attracted considerable interest. Recently, some attention has been paid to the analysis of keyed modes of Keccak sponge function. As a notable example,...
-
Article
Dynamics of linear systems over finite commutative rings
The dynamics of a linear dynamical system over a finite field can be described by using the elementary divisors of the corresponding matrix. It is natural to extend the investigation to a general finite commut...
-
Article
Correction: Corrigendum: Immune clearance of highly pathogenic SIV infection
Nature 502, 100–104 (2013); doi:10.1038/nature12519 The Acknowledgements section of this Letter should have included the following sentence: “We acknowledge the contribution of M. A. Jarvis to the design, cons...
-
Article
A polynomial time algorithm for GapCVPP in l 1 norm
This paper concerns the hardness of approximating the closest vector in a lattice with preprocessing in l 1 norm, and gives a polynomial time algorithm for GapCVPPγ in l 1 norm wit...
-
Article
On the ℓ 1-Norm Invariant Convex k-Sparse Decomposition of Signals
Inspired by an interesting idea of Cai and Zhang, we formulate and prove the convex k-sparse decomposition of vectors that is invariant with respect to the ℓ 1 norm. This result fits well in discu...