Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,756,039 papers from all fields of science
Search
Sign In
Create Free Account
Learning with errors
Known as:
LWE
, Learning with error
, R-LWE
Learning with errors (LWE) is a problem in machine learning that is conjectured to be hard to solve. Introduced by Oded Regev in 2005, it is a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
16 relations
Chosen-ciphertext attack
Computational hardness assumption
Homomorphic encryption
Ideal lattice cryptography
Expand
Broader (2)
Cryptography
Machine learning
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
A Note on Ring-LWE Security in the Case of Fully Homomorphic Encryption
Guillaume Bonnoron
,
C. Fontaine
International Conference on Cryptology in India
2017
Corpus ID: 18504189
Evaluating the practical security of Ring-LWE based cryptography has attracted lots of efforts recently. Indeed, some differences…
Expand
2017
2017
Non-Interactive Delegation for Low-Space Non-Deterministic Computation
S. Badrinarayanan
,
Y. Kalai
,
Dakshita Khurana
,
A. Sahai
,
Daniel Wichs
Electron. Colloquium Comput. Complex.
2017
Corpus ID: 3641133
We construct a delegation scheme for verifying non-deterministic computations, with complexity proportional only to the non…
Expand
2017
2017
Memory-constrained implementation of lattice-based encryption scheme on standard Java Card
Ye Yuan
,
Kazuhide Fukushima
,
S. Kiyomoto
,
T. Takagi
IEEE International Symposium on Hardware Oriented…
2017
Corpus ID: 33121898
Since NSA announced the plans for transitioning to the algorithms which are resistant to attacks by the potential quantum…
Expand
2015
2015
Λ ∘ λ: A Functional Library for Lattice Cryptography
E. Crockett
,
Chris Peikert
IACR Cryptology ePrint Archive
2015
Corpus ID: 14283931
This work describes the design and implementation of Λ◦λ, a general-purpose software library for lattice cryptography, written in…
Expand
2015
2015
Gaussian Sampling Precision and Information Leakage in Lattice Cryptography
Markku-Juhani O. Saarinen
IACR Cryptology ePrint Archive
2015
Corpus ID: 555827
Security parameters and attack countermeasures for Lattice-based cryptosystems have not yet matured to the level that we now…
Expand
2015
2015
Efficient Secure Outsourcing of Genome-Wide Association Studies
Wen-jie Lu
,
Yoshiji Yamada
,
Jun Sakuma
IEEE Security and Privacy Workshops
2015
Corpus ID: 16881601
A genome-wide association study aimed at finding genetic variations associated with a particular disease is a common approach…
Expand
2015
2015
On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices
H. Asghar
,
Ron Steinfeld
,
Shujun Li
,
M. Kâafar
,
J. Pieprzyk
IEEE Transactions on Information Forensics and…
2015
Corpus ID: 15150474
Human identification protocols are challenge-response protocols that rely on human computational ability to reply to random…
Expand
2014
2014
Adaptively Secure UC Constant Round Multi-Party Computation Protocols
I. Damgård
,
Antigoni Polychroniadou
,
V. Rao
IACR Cryptology ePrint Archive
2014
Corpus ID: 10758101
We present a universally composable multiparty computation protocol that is adaptively secure against corruption of n − 1 of the…
Expand
2013
2013
A Generator for LWE and Ring-LWE Instances
Martin R. Albrecht
,
Daniel Cabarcas
,
Robert Fitzpatrick
,
Florian Göpfert
,
Michael Schneider
2013
Corpus ID: 17721313
We introduce software for the generation of instances of the LWE and Ring-LWE problems, allowing both the generation of generic…
Expand
2002
2002
Application of combined non-thermal treatments for the processing of liquid whole egg
Dong-un Lee
2002
Corpus ID: 114620934
The objective of this research was to investigate the applicability of non-thermal treatments for the processing of liquid whole…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE