نتایج جستجو برای: such as homomorphic deconvolution

تعداد نتایج: 5967123  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس 1390

abstract:‎ literature is said beautiful words of poetry or prose that excites reader’s or listener’s feel. certainly, to ‎be effective, such a text should have certain characteristics. the four elements of the literature: thought, ‎imagination, emotion and style make a text to be literary and effective. emotion and imagination are ‎specific elements of literary texts, while thought and style a...

2016
Srinivas Devadas Marten van Dijk Christopher W. Fletcher Ling Ren Elaine Shi Daniel Wichs

We present Onion ORAM, an Oblivious RAM (ORAM) with constant worst-case bandwidthblowup that leverages poly-logarithmic server computation to circumvent the logarithmic lowerbound on ORAM bandwidth blowup. Our construction does not require fully homomorphicencryption, but employs an additively homomorphic encryption scheme such as the Damg̊ard-Jurik cryptosystem, or alternatively...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه کاشان - دانشکده ادبیات و زبانهای خارجی 1394

cohesion is an indispensable linguistic feature in discourse analysis. lexicald such a differe cohesion and conjunction in particular as two crucial elements to textual cohesion and comprehension has been the focus of a wide range of studies up to now. yet the relationship between the open register and cohesive devices has not been thoroughly investigated in discourse studies. this study concen...

Journal: :IACR Cryptology ePrint Archive 2015
Gizem S. Çetin Yarkin Doröz Berk Sunar William J. Martin

Homomorphic encryption has progressed rapidly in both efficiency and versatility since its emergence in 2009. Meanwhile, a multitude of pressing privacy needs — ranging from cloud computing to healthcare management to the handling of shared databases such as those containing genomics data — call for immediate solutions that apply fully homomorpic encryption (FHE) and somewhat homomorphic encryp...

2011
Seung-Hoon Lee Mario Gerla Hugo Krawczyk Kang-Won Lee Elizabeth A. Quaglia

Network coding has gained significant attention by improving throughput and reliability in disruptive MANETs. Yet, it is vulnerable to attacks from malicious nodes. In order to prevent malicious attacks, we have explored the use of secure network coding schemes based on homomorphic properties of cryptographic systems. While homomorphic methods protect network coding from both external and inter...

2015
Anne Broadbent Stacey Jeffery

Fully homomorphic encryption is an encryption method with the property that any computation on the plaintext can be performed by a party having access to the ciphertext only. Here, we formally define and give schemes for quantum homomorphic encryption, which is the encryption of quantum information such that quantum computations can be performed given the ciphertext only. Our schemes allow for ...

2014
Yarkin Doröz Aria Shahverdi Thomas Eisenbarth Berk Sunar

We present the homomorphic evaluation of the Prince block cipher. Our leveled implementation is based on a generalization of NTRU. We are motivated by the drastic bandwidth savings that may be achieved by scheme conversion. To unlock this advantage we turn to lightweight ciphers such as Prince. These ciphers were designed from scratch to yield fast and compact implementations on resource-constr...

2014
Damian Vizár Serge Vaudenay

Since Gentry’s breakthrough result was introduced in the year 2009, the homomorphic encryption has become a very popular topic. The main contribution of Gentry’s thesis [9] was, that it has proven, that it actually is possible to design a fully homomorphic encryption scheme. However ground-breaking Gentry’s result was, the designs, that employ the bootstrapping technique suffer from terrible pe...

Journal: :CoRR 2002
Dima Grigoriev Ilia V. Ponomarenko

An important problem of modern cryptography concerns secret public-key computations in algebraic structures. We construct homomorphic cryptosystems being (secret) epimorphisms f : G → H, where G,H are (publically known) groups and H is finite. A letter of a message to be encrypted is an element h ∈ H, while its encryption g ∈ G is such that f(g) = h. A homomorphic cryptosystem allows one to per...

2015
Ricardo Dahab Steven D. Galbraith Eduardo Morais

In this paper we present adaptive key recovery attacks on NTRU-based somewhat homomorphic encryption schemes. Among such schemes, we study the proposal by Bos et al [BLLN13] in 2013. Given access to a decryption oracle, the attack allows us to compute the private key for all parameter choices. Such attacks show that one must be very careful about the use of homomorphic encryption in practice. T...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید