We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Lattice Theory for Machine Learning

    Abstract

    This article presents a theoretical foundation for constructing a machine learning system based on the binary similarity operation. The key...

    Article 01 December 2022
  2. Lattice codes for lattice-based PKE

    Existing error correction mechanisms in lattice-based public key encryption (PKE) rely on either trivial modulation or its concatenation with error...

    Shanxiang Lyu, Ling Liu, ... Hao Chen in Designs, Codes and Cryptography
    Article 16 November 2023
  3. Lattice basis reduction techniques

    In recent years, there has been a significant amount of work conducted in the field of Lattice Basis Reduction Techniques, which is one of the...

    Ajay Dabral, S. K. Pal, Arvind Yadav in Multimedia Tools and Applications
    Article 01 February 2024
  4. Security Evaluation on KpqC Round 1 Lattice-Based Algorithms Using Lattice Estimator

    Post-quantum cryptography is expected to become one of the fundamental technologies in the field of security that requires public-key cryptosystems,...
    Suhri Kim, Eunmin Lee, ... Hyuna Noh in Information Security and Cryptology – ICISC 2023
    Conference paper 2024
  5. Lattice-Based Secret Sharing Scheme (Chinese Remainder Theorem)

    Secret sharing schemes are used as a tool in many cryptographic protocols including revocable electronic cash, electronic voting, cloud computing and...
    Songshou Dong, Yanqing Yao, ... Yuguang Yang in Digital Forensics and Cyber Crime
    Conference paper 2024
  6. Correspondence Theory on Vector Spaces

    This paper extends correspondence theory to the framework of \(\mathbb {K}\)...
    Alessandra Palmigiano, Mattia Panettiere, Ni Wayan Switrayni in Logic, Language, Information, and Computation
    Conference paper 2024
  7. A survey on lattice-based digital signature

    Lattice-based digital signature has become one of the widely recognized post-quantum algorithms because of its simple algebraic operation, rich...

    Fengxia Liu, Zhiyong Zheng, ... Qun Xu in Cybersecurity
    Article Open access 01 April 2024
  8. Quantum Augmented Lattice Attack on NTRU with Side Information

    NTRU is one of the most important lattice-based public key cryptosystems, and a potential candidate for post-quantum cryptography. This paper derives...
    Qingfeng Cheng, **zheng Cao, **angyang Luo in Information Security and Cryptology
    Conference paper 2024
  9. A New Self-dual BKZ Algorithm Based on Lattice Sieving

    Lattice reduction algorithm is an important algorithm for solving lattice Shortest Vector Problem (SVP), which makes it the primary tool for...
    **xuan Deng, Huiwen Jia in Frontiers in Cyber Security
    Conference paper 2024
  10. Lattice Linearity of Multiplication and Modulo

    In this paper, we study the lattice linearity of multiplication and modulo operations. We demonstrate that these operations are lattice linear and...
    Arya Tanmay Gupta, Sandeep S. Kulkarni in Stabilization, Safety, and Security of Distributed Systems
    Conference paper 2023
  11. Concrete Analysis of Quantum Lattice Enumeration

    Lattice reduction algorithms such as BKZ (Block-Korkine-Zolotarev) play a central role in estimating the security of lattice-based cryptography. The...
    Shi Bai, Maya-Iggy van Hoof, ... Tran Ngo in Advances in Cryptology – ASIACRYPT 2023
    Conference paper 2023
  12. Approximation Fixpoint Theory in Coq

    Approximation Fixpoint Theory (AFT) is an abstract framework based on lattice theory that unifies semantics of different non-monotonic logic. AFT has...
    Bart Bogaerts, Luís Cruz-Filipe in Logics and Type Systems in Theory and Practice
    Chapter 2024
  13. Error Correction and Ciphertext Quantization in Lattice Cryptography

    Recent work in the design of rate \(1 - o(1)\)...
    Daniele Micciancio, Mark Schultz in Advances in Cryptology – CRYPTO 2023
    Conference paper 2023
  14. Hesitant fuzzy three-way concept lattice and its attribute reduction

    Formal concept analysis is a widely studied mathematical tool for performing data analysis and processing. Three-way decision is a model of decision...

    Jun Zhang, Qian Hu, ... Chao Fu in Applied Intelligence
    Article 16 February 2024
  15. Certificateless network coding proxy signatures from lattice

    Network coding can improve the information transmission efficiency and reduces the network resource consumption, so it is a very good platform for...

    Huifang Yu, Ning Wang in Frontiers of Computer Science
    Article 13 December 2022
  16. Crisp-Fuzzy Concept Lattice Based on Interval-Valued Fuzzy Sets

    Fuzzy concept lattices can be viewed as the generalizations of the classical concept lattices in fuzzy formal contexts, which is a key issue and a...
    Tong-Jun Li, Yi-Qian Wang in Rough Sets
    Conference paper 2023
  17. Hull Attacks on the Lattice Isomorphism Problem

    The lattice isomorphism problem (LIP) asks one to find an isometry between two lattices. It has recently been proposed as a foundation for...
    Léo Ducas, Shane Gibbons in Public-Key Cryptography – PKC 2023
    Conference paper 2023
  18. Bit Security Analysis of Lattice-Based KEMs Under Plaintext-Checking Attacks

    Plaintext-checking attack (PCA) is a type of attack where an adversary recovers the secret key with the help of a plaintext-checking (PC) oracle that...
    Ruiqi Mi, Haodong Jiang, Zhenfeng Zhang in Selected Areas in Cryptography – SAC 2023
    Conference paper 2024
  19. Lattice-Free Simplices with Lattice Width \(2d - o(d)\)

    The Flatness theorem states that the maximum lattice width \(\mathrm {Flt}(d)\)...
    Lukas Mayrhofer, Jamico Schade, Stefan Weltge in Integer Programming and Combinatorial Optimization
    Conference paper 2022
  20. Ideal hierarchical secret sharing and lattice path matroids

    By a fundamental result by Brickell and Davenport (J Cryptol 4:123–134, 1991), the access structures of ideal secret sharing schemes are matroid...

    Article 20 November 2022
Did you find what you were looking for? Share feedback.