We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Transit ring: bubble flow control for eliminating inter-ring communication congestion

    Bubble flow control is a flow control mechanism commonly used in torus network. Bubble flow control ensures the orderly flow of packets in the ring...

    Yiming Ouyang, Chenglong Sun, ... Jianhua Li in The Journal of Supercomputing
    Article 21 July 2022
  2. Formalization of Ring Theory in PVS

    This paper presents a PVS development of relevant results of the theory of rings. The PVS theory includes complete proofs of the three classical...

    Thaynara Arielly de Lima, André Luiz Galdino, ... Mauricio Ayala-Rincón in Journal of Automated Reasoning
    Article 12 May 2021
  3. Rinocchio: SNARKs for Ring Arithmetic

    Succinct non-interactive arguments of knowledge (SNARKs) enable non-interactive efficient verification of NP computations and admit short proofs....

    Chaya Ganesh, Anca Nitulescu, Eduardo Soria-Vazquez in Journal of Cryptology
    Article 13 October 2023
  4. Logarithmic-Size (Linkable) Ring Signatures from Lattice Isomorphism Problems

    The Lattice Isomorphism Problem (LIP) asks whether two given lattices are isomorphic via an orthogonal linear transformation. At Eurocrypt 2022,...
    Xuan Thanh Khuc, Anh The Ta, ... Shinsaku Kiyomoto in Security, Privacy, and Applied Cryptography Engineering
    Conference paper 2024
  5. Simplification of λ-ring expressions in the Grothendieck ring of Chow motives

    The Grothendieck ring of Chow motives admits two natural opposite λ -ring structures, one of which is a special structure allowing the definition of...

    Article 02 June 2022
  6. Design and Analysis of a Novel Ring Truss Deployable Antenna Mechanism

    With the development of astronautics, satellite antenna as an important communication equipment has also gradually developed to large scale. In this...
    Bo Han, Zhantu Yuan, ... Yongsheng Zhao in Intelligent Robotics and Applications
    Conference paper 2023
  7. Traceable Ring Signatures from Group Actions: Logarithmic, Flexible, and Quantum Resistant

    Traceable ring signature (TRS) is a variation of ring signature, allowing to expose the user’s identity whenever he signs two different messages...
    Wei Wei, Min Luo, ... Debiao He in Selected Areas in Cryptography – SAC 2023
    Conference paper 2024
  8. A Ring-Based Distributed Algorithm for Learning High-Dimensional Bayesian Networks

    Learning Bayesian Networks (BNs) from high-dimensional data is a complex and time-consuming task. Although there are approaches based on horizontal...
    Jorge D. Laborda, Pablo Torrijos, ... José A. Gámez in Symbolic and Quantitative Approaches to Reasoning with Uncertainty
    Conference paper 2024
  9. Image inpainting based on tensor ring decomposition with generative adversarial network

    Image inpainting is a fundamental task in the field of computer vision. However, there are three major challenges associated with this technique: (1)...

    Jianjun Yuan, Hong Wu, ... Fujun Wu in Signal, Image and Video Processing
    Article 12 July 2024
  10. Faster Amortized FHEW Bootstrap** Using Ring Automorphisms

    Amortized bootstrap** offers a way to simultaneously refresh many ciphertexts of a fully homomorphic encryption scheme, at a total cost comparable...
    Gabrielle De Micheli, Duhyeong Kim, ... Adam Suhl in Public-Key Cryptography – PKC 2024
    Conference paper 2024
  11. Generating Supersingular Elliptic Curves over  \(\mathbb {F}_p\) with Unknown Endomorphism Ring

    A number of supersingular isogeny based cryptographic protocols require the endomorphism ring of the initial elliptic curve to be either unknown or...
    Youcef Mokrani, David Jao in Progress in Cryptology – INDOCRYPT 2023
    Conference paper 2024
  12. Linear complementary pairs of constacyclic n-D codes over a finite commutative ring

    In this paper, a necessary condition which is sufficient as well for a pair of constacyclic 2-D codes over a finite commutative ring R to be an LCP...

    Ridhima Thakral, Sucheta Dutt, Ranjeet Sehmi in Applicable Algebra in Engineering, Communication and Computing
    Article 19 January 2024
  13. On Digital Signatures Based on Group Actions: QROM Security and Ring Signatures

    Group action based cryptography was formally proposed in the seminal paper of Brassard and Yung (Crypto 1990). Based on one-way group action, there...
    Markus Bläser, Zhili Chen, ... Gang Tang in Post-Quantum Cryptography
    Conference paper 2024
  14. Lattice-based ring signcryption scheme for smart healthcare management

    Conventional signcryption schemes that depend on discrete logarithm problem, big integer prime factorization, and bilinear pairing are at risk in the...

    Sourav, Rifaqat Ali in Cluster Computing
    Article 15 July 2024
  15. An anonymous authentication with blockchain assisted ring-based homomorphic encryption for enhancing security in cloud computing

    Nowadays, the need for cloud computing has increased due to the exponential growth in information transmission. Cybercriminals are persistent in...

    Pranav Shrivastava, Bashir Alam, Mansaf Alam in Cluster Computing
    Article 02 July 2024
  16. Non-commutative Ring Learning with Errors from Cyclic Algebras

    The Learning with Errors (LWE) problem is the fundamental backbone of modern lattice-based cryptography, allowing one to establish cryptography on...

    Charles Grover, Andrew Mendelsohn, ... Roope Vehkalahti in Journal of Cryptology
    Article Open access 13 July 2022
  17. Digital Signature Schemes Based on Group Ring

    In this paper, we propose three digital signature schemes based on the algebraic structure of group ring. The first scheme is a deterministic...

    Sunil Kumar, Gaurav Mittal, Sandeep Kumar in SN Computer Science
    Article 26 July 2022
  18. Ultra-compact with improved data rate optical encoder based on 2D linear photonic crystal ring resonator

    In the present work, a high-speed optical encoder is proposed based on two-dimensional photonic crystal ring resonator using coupled mode theory and...

    Mayur Kumar Chhipa, B. T. P. Madhav, ... Vijay Janyani in Photonic Network Communications
    Article 15 June 2022
  19. Hyper-chaotic image encryption system based on N + 2 ring Joseph algorithm and reversible cellular automata

    Due to the complex characteristics of chaotic system, such as initial value sensitivity, periodicity and pseudo-randomness, chaotic sequences...

    **aojuan Ma, Chunhua Wang in Multimedia Tools and Applications
    Article 28 March 2023
  20. MacWilliams type identities on Sharma-Kaushik weights for linear codes over ring Zq

    This work relates to the discipline of Error-Correcting Codes which is an indispensable part of any theory for designing properly functioning...

    Meenakshi Sridhar, Manohar Lal Kaushik in International Journal of Information Technology
    Article 26 July 2023
Did you find what you were looking for? Share feedback.