Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,284 papers from all fields of science
Search
Sign In
Create Free Account
Learning with errors
Known as:
LWE
, Learning with error
, R-LWE
Learning with errors (LWE) is a problem in machine learning that is conjectured to be hard to solve. Introduced by Oded Regev in 2005, it is a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
16 relations
Chosen-ciphertext attack
Computational hardness assumption
Homomorphic encryption
Ideal lattice cryptography
Expand
Broader (2)
Cryptography
Machine learning
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Algebraic aspects of solving Ring-LWE, including ring-based improvements in the Blum-Kalai-Wasserman algorithm
Katherine E. Stange
IACR Cryptology ePrint Archive
2019
Corpus ID: 67752874
We provide a reduction of the Ring-LWE problem to Ring-LWE problems in subrings, in the presence of samples of a restricted form…
Expand
2019
2019
Integer Version of Ring-LWE and its Applications
Chunsheng Gu
IACR Cryptology ePrint Archive
2019
Corpus ID: 8088096
In this work, we introduce an integer version of ring-LWE (I-RLWE) over the polynomial rings and present a public key encryption…
Expand
2017
2017
Practical Implementation of Lattice-Based Program Obfuscators for Point Functions
L. Bahler
,
G. D. Crescenzo
,
Yuriy Polyakov
,
Kurt Rohloff
,
David Cousins
International Symposium on High Performance…
2017
Corpus ID: 21640666
Lattice-based cryptography has recently produced several time-efficient cryptosystems that are provably secure under assumptions…
Expand
2016
2016
Universal Obfuscation and Witness Encryption: Boosting Correctness and Combining Security
P. Ananth
,
Aayush Jain
,
M. Naor
,
A. Sahai
,
E. Yogev
IACR Cryptology ePrint Archive
2016
Corpus ID: 18377411
Over the last few years a new breed of cryptographic primitives has arisen: on one hand they have previously unimagined utility…
Expand
2015
2015
Efficient Secure Outsourcing of Genome-Wide Association Studies
Wen-jie Lu
,
Yoshiji Yamada
,
Jun Sakuma
IEEE Security and Privacy Workshops
2015
Corpus ID: 16881601
A genome-wide association study aimed at finding genetic variations associated with a particular disease is a common approach…
Expand
2015
2015
On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices
H. Asghar
,
Ron Steinfeld
,
Shujun Li
,
M. Kâafar
,
J. Pieprzyk
IEEE Transactions on Information Forensics and…
2015
Corpus ID: 15150474
Human identification protocols are challenge-response protocols that rely on human computational ability to reply to random…
Expand
2014
2014
Adaptively Secure UC Constant Round Multi-Party Computation Protocols
I. Damgård
,
Antigoni Polychroniadou
,
V. Rao
IACR Cryptology ePrint Archive
2014
Corpus ID: 10758101
We present a universally composable multiparty computation protocol that is adaptively secure against corruption of n − 1 of the…
Expand
2013
2013
HELEN: A Public-Key Cryptosystem Based on the LPN and the Decisional Minimal Distance Problems
Alexandre Duc
,
S. Vaudenay
International Conference on Cryptology in Africa
2013
Corpus ID: 7194512
We propose HELEN, a code-based public-key cryptosystem whose security is based on the hardness of the Learning from Parity with…
Expand
2012
2012
The Implemention and Application of Fully Homomorphic Encryption Scheme
Jing-Li Han
,
Ming-How Yang
,
Cai-Ling Wang
,
Shan-Shan Xu
Second International Conference on…
2012
Corpus ID: 10357800
Fully homomorphic encryption scheme (FHE) has numerous applications, especially in the cloud computation. Recently, FHE has been…
Expand
2002
2002
Application of combined non-thermal treatments for the processing of liquid whole egg
Dong-un Lee
2002
Corpus ID: 114620934
The objective of this research was to investigate the applicability of non-thermal treatments for the processing of liquid whole…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required