搜索结果: 1-15 共查到“linear algebra”相关记录19条 . 查询时间(0.078 秒)
A Framework for Cryptographic Problems from Linear Algebra
LWE SIS NTRU
font style='font-size:12px;'>
2019/3/13
We introduce a general framework encompassing the main hard problems emerging in lattice-based cryptography, which naturally includes the recently proposed Mersenne prime cryptosystem, but also code-b...
New Protocols for Secure Linear Algebra: Pivoting-Free Elimination and Fast Block-Recursive Matrix Decomposition
secure linear algebra multiparty computation
font style='font-size:12px;'>
2018/8/2
Cramer and Damgård were the first to propose a constant-rounds protocol for securely solving a linear system of unknown rank over a finite field in multiparty computation (MPC). For mm linear equ...
MRHS Solver Based on Linear Algebra and Exhaustive Search
Algebraic cryptanalysis MRHS LowMC
font style='font-size:12px;'>
2018/1/31
We show how to build a binary matrix from the MRHS representation of a symmetric-key cipher. The matrix contains the cipher represented as an equation system and can be used to assess a cipher's resis...
2018定量线性代数教程研讨会(Workshop on Quantitative Linear Algebra Tutorials)
2018 定量线性代数教程 研讨会
font style='font-size:12px;'>
2017/12/20
The program opens with four days of tutorials that will provide an introduction to major themes of the entire program and the four workshops.The goal is to build a foundation for the participants of t...
2018年SIAM应用线性代数会议(SIAM Conference on Applied Linear Algebra)
2018年 SIAM 应用线性代数 会议
font style='font-size:12px;'>
2017/12/20
Linear algebra is an important area of mathematics and it is at the heart of many scientific, engineering, and industrial applications. Research and development in linear algebra include theoretical s...
Differentially Private Linear Algebra in the Streaming Model
Differential Privacy Linear Algebra Random Projection
font style='font-size:12px;'>
2016/1/7
The focus of this paper is a systematic study of differential privacy on streaming data using sketchbased
algorithms. Previous works, like Dwork et al. (ICS 2010, STOC 2010), explored random sampling...
Nearly Sparse Linear Algebra
Sparse Linear Algebra Block Wiedemann Algorithm Discrete Logarithm
font style='font-size:12px;'>
2015/12/22
In this article, we propose a method to perform linear algebra
on a matrix with nearly sparse properties. More precisely, although
we require the main part of the matrix to be sparse, we allow some ...
Functional Verification of Arithmetic Circuits using Linear Algebra Methods
Functional Verification Arithmetic Circuits Linear Algebra SMT Arithmetic bit-level Equivalence checking
font style='font-size:12px;'>
2014/12/8
This thesis describes an efficient method for speeding up functional verification of arithmetic circuits namely linear network such as wallace trees, counters using linear algebra techniques. The circ...
Efficient and Secure Delegation of Linear Algebra
cryptographic protocols
font style='font-size:12px;'>
2012/6/14
We consider secure delegation of linear algebra computation, wherein a client, \emph{privately} and \emph{verifiably}, outsources tasks such as matrix multiplication, matrix inversion, computing the r...
Efficient and Secure Delegation of Linear Algebra
cryptographic protocols
font style='font-size:12px;'>
2012/3/22
We consider secure delegation of linear algebra computation, wherein a client, \emph{privately} and \emph{verifiably}, outsources tasks such as matrix multiplication, matrix inversion, computing the r...
Efficient and Secure Delegation of Linear Algebra
cryptographic protocols
font style='font-size:12px;'>
2012/3/21
We consider secure delegation of linear algebra computation, wherein a client, \emph{privately} and \emph{verifiably}, outsources tasks such as matrix multiplication, matrix inversion, computing the r...
Randomized Communication Complexity for Linear Algebra Problems over Finite Fields
communication complexity streaming, matrix singularity determinant
font style='font-size:12px;'>
2012/12/3
Finding the singularity of a matrix is a basic problem in linear algebra. Chu and Schnitger first considered this problem in the communication complexity model, in which Alice holds the first half of ...
Linear algebra and bootstrap percolation
Bootstrap percolation linear algebra weak saturation
font style='font-size:12px;'>
2011/8/29
Abstract: In $\HH$-bootstrap percolation, a set $A \subset [n]$ of initially `infected' vertices spreads by infecting vertices which are the only uninfected vertex in an edge of the hypergraph $\HH \s...
Interval Linear Algebra
Interval Linear Algebra
font style='font-size:12px;'>
2011/1/21
Interval Linear Algebra,
Efficient Zero-knowledge Authentication Based on a Linear Algebra Problem MinRank
Zero-knowledge identification entity authentication
font style='font-size:12px;'>
2009/4/16
A Zero-knowledge protocol provides provably secure entity
authentication based on a hard computational problem. Among many
schemes proposed since 1984, the most practical rely on factoring and discr...