We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Optimized quantum circuit implementation of SATURNIN for Grover’s algorithm

    In 2019, SATURNIN a light-weighted block cipher was proposed for post-quantum security. In this research, we try to examine the security strength of...

    Swamy Naidu Allu, T. Appala Naidu, K. Gangadhara Rao in International Journal of Information Technology
    Article 21 March 2024
  2. Improving \(3N\) Circuit Complexity Lower Bounds

    Magnus Gausdal Find , Alexander Golovnev , ... Alexander S. Kulikov in computational complexity
    Article 16 December 2023
  3. A lower bound for differential uniformity by multiplicative complexity & bijective functions of multiplicative complexity 1 over finite fields

    The multiplicative complexity of an S-box over a finite field is the minimum number of multiplications needed to implement the S-box as an arithmetic...

    Matthias Johann Steiner in Cryptography and Communications
    Article Open access 15 August 2023
  4. Estimating feature importance in circuit network using machine learning

    Identifying the feature of the circuit network is a crucial step to understanding the behavior of the Very Large Scale Integration (VLSI)....

    Tingyuan Nie, Mingzhi Zhao, ... Zhenhao Wang in Multimedia Tools and Applications
    Article 15 September 2023
  5. Circuit simulation and image encryption based on a six-dimensional cellular neural network hyperchaotic system

    This paper proposes a six-dimensional hyperchaotic system based on the Cellular Neural Networks (CNN) theory. Numerical analysis of the Lyapunov...

    Jie Zhang, Qinggang **e, ... **you Hou in Multimedia Tools and Applications
    Article 07 October 2023
  6. A new three-dimensional memristor chaotic circuit design and its application in image encryption

    In recent years, memristors have received widespread attention due to their inherent nonlinear characteristics. To this end, a three-dimensional...

    Jie Zhang, Enze Liu, Yan Guo in The Journal of Supercomputing
    Article 25 March 2024
  7. Circuit Bootstrap**: Faster and Smaller

    We present a novel circuit bootstrap** algorithm that outperforms the state-of-the-art TFHE method with 9.9...
    Ruida Wang, Yundi Wen, ... Kunpeng Wang in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  8. Reducing Garbled Circuit Size While Preserving Circuit Gate Privacy

    This paper investigates efficient and confidential circuit garbling techniques. The primary contribution of this research is the introduction of...
    Yongge Wang, Qutaibah M. Malluhi in Progress in Cryptology - AFRICACRYPT 2024
    Conference paper 2024
  9. Parameterized Complexity

    We look at the basics of parameterized complexity. This is a method which seeks to find tractability by limiting some parameter in the input. We...
    Chapter 2024
  10. Evolving Complexity is Hard

    Understanding the evolution of complexity is an important topic in a wide variety of academic fields. Implications of better understanding complexity...
    Alden H. Wright, Cheyenne L. Laue in Genetic Programming Theory and Practice XIX
    Chapter 2023
  11. Quantum circuit implementations of lightweight authenticated encryption ASCON

    In this paper, we discuss the quantum circuit implementations of the lightweight authenticated encryption algorithm ASCON by using the NOT gates,...

    Yuanmeng Zheng, Qingbin Luo, ... Yi Lv in The Journal of Supercomputing
    Article 23 January 2024
  12. Monotone Arithmetic Complexity of Graph Homomorphism Polynomials

    We study homomorphism polynomials, which are polynomials that enumerate all homomorphisms from a pattern graph H to n -vertex graphs. These...

    Balagopal Komarath, Anurag Pandey, C. S. Rahul in Algorithmica
    Article 11 March 2023
  13. Adaptively Secure MPC with Sublinear Communication Complexity

    A central challenge in the study of MPC is to balance between security guarantees, hardness assumptions, and resources required for the protocol. In...

    Ran Cohen, Abhi Shelat, Daniel Wichs in Journal of Cryptology
    Article 22 March 2023
  14. Enhanced Shor’s algorithm with quantum circuit optimization

    Most researchers in the field of cryptography are very aware of attack possibilities from quantum computers. Large integer factorization remains a...

    Syed Shamikh Iqbal, Aasim Zafar in International Journal of Information Technology
    Article 22 February 2024
  15. Distinguishing genelet circuit input pulses via a pulse detector

    Chemical systems have the potential to direct the next generation of dynamic materials if they can be integrated with a material while acting as the...

    Colin Yancey, Rebecca Schulman in Natural Computing
    Article Open access 20 June 2024
  16. Design and Realization of Encoders Based on Switching Circuit

    With the rapid development of DNA nanotechnology, a variety of flexible molecular computing models and logic computing systems have been proposed and...
    Zigeng Liu, Yanjun Liu, ... Yingxin Hu in Bio-Inspired Computing: Theories and Applications
    Conference paper 2024
  17. Optimized VLSI Circuit Partitioning and Testing Using ACO and BIST Architectures

    Circuit partitioning, an essential strategy in physical design, involves dividing a circuit according to specific constraints to meet particular...
    M. R. Ezilarasan, D. Preethi, ... **angguang Dai in Advances in Neural Networks – ISNN 2024
    Conference paper 2024
  18. Some Structural Complexity

    We develop some general results on computational complexity. We show that normal methods which relativize are insufficient to decide many natural...
    Chapter 2024
  19. Improved Circuit-Based PSI via Equality Preserving Compression

    Circuit-based private set intersection (circuit-PSI) enables two parties with input set X and Y to compute a function f over the intersection set...
    Kyoohyung Han, Dukjae Moon, Yongha Son in Selected Areas in Cryptography
    Conference paper 2024
  20. A power-efficient approximate approach to improve the computational complexity of coding tools in versatile video coding

    Approximate computing is a technique for optimising algorithms while taking into account both application quality of service and computational...

    Sina Shah Oveisi, Hoda Roodaki, ... Masoud Dehyadegari in Multimedia Tools and Applications
    Article 06 February 2024
Did you find what you were looking for? Share feedback.