X
Search Filters
Format Format
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
computer science (20) 20
cryptography (19) 19
data encryption (17) 17
algorithms (13) 13
encryption (12) 12
algorithm analysis and problem complexity (11) 11
engineering, electrical & electronic (9) 9
mathematics (9) 9
computer communication networks (8) 8
computer science, theory & methods (8) 8
data structures, cryptology and information theory (8) 8
discrete mathematics in computer science (8) 8
elliptic curve cryptography (7) 7
homomorphic encryption (7) 7
polynomials (7) 7
research (7) 7
number theoretic transform (6) 6
physics (6) 6
systems and data security (6) 6
usage (6) 6
verschlüsselung (6) 6
arrangements, systems or apparatus for checking not providedfor elsewhere (5) 5
book covers (5) 5
bookbinding (5) 5
checking-devices (5) 5
coding and information theory (5) 5
computation (5) 5
devices for use therewith and not otherwise providedfor (5) 5
female (5) 5
files (5) 5
formal cohomology (5) 5
generating random numbers (5) 5
hardware (5) 5
humans (5) 5
kedlaya's algorithm (5) 5
kryptographie (5) 5
lattice-based cryptography (5) 5
loose leaves (5) 5
management of computing and information systems (5) 5
monsky-washnitzer cohomology (5) 5
movable-strip writing or reading apparatus (5) 5
performing operations (5) 5
polynomial multiplication (5) 5
printed matter characterised by identification or securityfeatures (5) 5
printed matter of special format or style nototherwise provided for (5) 5
registering or indicating the working of machines (5) 5
ring-lwe (5) 5
special printed matter (5) 5
symbolic and algebraic manipulation (5) 5
tate pairing (5) 5
time or attendance registers (5) 5
transporting (5) 5
voting or lottery apparatus (5) 5
cloud computing (4) 4
computer architecture (4) 4
computer science, hardware & architecture (4) 4
computers and society (4) 4
elliptic curve (4) 4
elliptic curves (4) 4
hardware implementation (4) 4
hyperelliptic curves (4) 4
information theory (4) 4
mathematics, applied (4) 4
multiplication (4) 4
operating systems (4) 4
privacy (4) 4
adult (3) 3
aged (3) 3
ate pairing (3) 3
computer science, information systems (3) 3
computer security (3) 3
curves, elliptic (3) 3
entschlüsselung (3) 3
fault attack (3) 3
finite-fields (3) 3
gaussian distribution (3) 3
iminds (3) 3
middle aged (3) 3
modular reduction (3) 3
oncology (3) 3
prognosis (3) 3
public key cryptography (3) 3
radiotherapy (3) 3
roots (3) 3
security (3) 3
software (3) 3
software-implementierung (3) 3
toxicity (3) 3
94a60 (2) 2
[ info.info-cr ] computer science [cs]/cryptography and security [cs.cr] (2) 2
abelian-varieties (2) 2
algebra (2) 2
algebra and number theory (2) 2
algorithm (2) 2
analysis (2) 2
animals (2) 2
architecture (2) 2
arithmetik (2) 2
barrett reduction (2) 2
more...
Library Location Library Location
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Journal Article
IEEE Transactions on Information Theory, ISSN 0018-9448, 01/2010, Volume 56, Issue 1, pp. 455 - 461
Journal Article
BMC MEDICAL GENOMICS, ISSN 1755-8794, 10/2018, Volume 11, Issue Suppl 4, pp. 86 - 21
Background: Logistic regression is a popular technique used in machine learning to construct classification models. Since the construction of such models is... 
Logistic regression | Privacy | Homomorphic encryption | Fixed Hessian | GENETICS & HEREDITY | Datasets | Problems | Cloud computing | Learning algorithms | Embedded systems | Algorithms | Classification | Data processing | Iterative methods | Artificial intelligence | Cancer
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2016, Volume 9665, pp. 147 - 167
Conference Proceeding
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2014, Volume 8282, pp. 383 - 401
Conference Proceeding
Post-Quantum Cryptography - 10th International Conference, PQCrypto 2019, Revised Selected Papers, ISSN 1611-3349, 07/2019, pp. 271 - 285
We speed up the isogeny-based “SeaSign” signature scheme recently proposed by De Feo and Galbraith. The core idea in SeaSign is to apply the “Fiat–Shamir with... 
SeaSign | Computer Science(all) | Rejection sampling | Theoretical Computer Science | Isogeny-based cryptography | Signatures | Group actions
Conference Proceeding
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2018, Volume 10831, pp. 282 - 305
Conference Proceeding
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2017, Volume 10239, pp. 184 - 201
Conference Proceeding
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2017, Volume 10064, pp. 193 - 207
Conference Proceeding
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2014, Volume 8731, pp. 371 - 391
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2015, Volume 9293, pp. 683 - 702
Conference Proceeding
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2017, Volume 10529, pp. 579 - 600
Conference Proceeding
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2015, Volume 9293, pp. 164 - 184
Conference Proceeding
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2016, Volume 9606, pp. 233 - 244
Conference Proceeding
IEEE Transactions on Computers, ISSN 0018-9340, 09/2017, Volume 66, Issue 9, pp. 1562 - 1572
In this paper we propose a scheme to perform homomorphic evaluations of arbitrary depth with the assistance of a special module recryption box. Existing... 
number theoretic transform | Public key | Computer architecture | ring-LWE | Hardware | Encryption | polynomial multiplication | Homomorphic encryption | lattice-based cryptography | Field programmable gate arrays | hardware implementation | Usage | Research | Cryptography | Digital integrated circuits | Searching
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.