Search
Search Results
-
Transit ring: bubble flow control for eliminating inter-ring communication congestion
Bubble flow control is a flow control mechanism commonly used in torus network. Bubble flow control ensures the orderly flow of packets in the ring...
-
Formalization of Ring Theory in PVS
This paper presents a PVS development of relevant results of the theory of rings. The PVS theory includes complete proofs of the three classical...
-
Rinocchio: SNARKs for Ring Arithmetic
Succinct non-interactive arguments of knowledge (SNARKs) enable non-interactive efficient verification of NP computations and admit short proofs....
-
Logarithmic-Size (Linkable) Ring Signatures from Lattice Isomorphism Problems
The Lattice Isomorphism Problem (LIP) asks whether two given lattices are isomorphic via an orthogonal linear transformation. At Eurocrypt 2022,... -
Simplification of λ-ring expressions in the Grothendieck ring of Chow motives
The Grothendieck ring of Chow motives admits two natural opposite λ -ring structures, one of which is a special structure allowing the definition of...
-
Design and Analysis of a Novel Ring Truss Deployable Antenna Mechanism
With the development of astronautics, satellite antenna as an important communication equipment has also gradually developed to large scale. In this... -
Traceable Ring Signatures from Group Actions: Logarithmic, Flexible, and Quantum Resistant
Traceable ring signature (TRS) is a variation of ring signature, allowing to expose the user’s identity whenever he signs two different messages... -
A Ring-Based Distributed Algorithm for Learning High-Dimensional Bayesian Networks
Learning Bayesian Networks (BNs) from high-dimensional data is a complex and time-consuming task. Although there are approaches based on horizontal... -
Image inpainting based on tensor ring decomposition with generative adversarial network
Image inpainting is a fundamental task in the field of computer vision. However, there are three major challenges associated with this technique: (1)...
-
Faster Amortized FHEW Bootstrap** Using Ring Automorphisms
Amortized bootstrap** offers a way to simultaneously refresh many ciphertexts of a fully homomorphic encryption scheme, at a total cost comparable... -
Generating Supersingular Elliptic Curves over \(\mathbb {F}_p\) with Unknown Endomorphism Ring
A number of supersingular isogeny based cryptographic protocols require the endomorphism ring of the initial elliptic curve to be either unknown or... -
Linear complementary pairs of constacyclic n-D codes over a finite commutative ring
In this paper, a necessary condition which is sufficient as well for a pair of constacyclic 2-D codes over a finite commutative ring R to be an LCP...
-
On Digital Signatures Based on Group Actions: QROM Security and Ring Signatures
Group action based cryptography was formally proposed in the seminal paper of Brassard and Yung (Crypto 1990). Based on one-way group action, there... -
Lattice-based ring signcryption scheme for smart healthcare management
Conventional signcryption schemes that depend on discrete logarithm problem, big integer prime factorization, and bilinear pairing are at risk in the...
-
An anonymous authentication with blockchain assisted ring-based homomorphic encryption for enhancing security in cloud computing
Nowadays, the need for cloud computing has increased due to the exponential growth in information transmission. Cybercriminals are persistent in...
-
Non-commutative Ring Learning with Errors from Cyclic Algebras
The Learning with Errors (LWE) problem is the fundamental backbone of modern lattice-based cryptography, allowing one to establish cryptography on...
-
Digital Signature Schemes Based on Group Ring
In this paper, we propose three digital signature schemes based on the algebraic structure of group ring. The first scheme is a deterministic...
-
Ultra-compact with improved data rate optical encoder based on 2D linear photonic crystal ring resonator
In the present work, a high-speed optical encoder is proposed based on two-dimensional photonic crystal ring resonator using coupled mode theory and...
-
Hyper-chaotic image encryption system based on N + 2 ring Joseph algorithm and reversible cellular automata
Due to the complex characteristics of chaotic system, such as initial value sensitivity, periodicity and pseudo-randomness, chaotic sequences...
-
MacWilliams type identities on Sharma-Kaushik weights for linear codes over ring Zq
This work relates to the discipline of Error-Correcting Codes which is an indispensable part of any theory for designing properly functioning...