نتایج جستجو برای: multistepiterative algorithm with bounded errors

تعداد نتایج: 9513054  

Typographical data entry errors and incomplete documents, produce imperfect records in real world databases. These errors generate distinct records which belong to the same entity. The aim of Approximate Record Matching is to find multiple records which belong to an entity. In this paper, an algorithm for Approximate Record Matching is proposed that can be adapted automatically with input error...

2016
Hao Chen Kristin E. Lauter Katherine E. Stange

We explore further the hardness of the non-dual discrete variant of the Ring-LWE problem for various number rings, give improved attacks for certain rings satisfying some additional assumptions, construct a new family of vulnerable Galois number fields, and apply some number theoretic results on Gauss sums to deduce the likely failure of these attacks for 2-power cyclotomic rings and unramified...

Journal: :IACR Cryptology ePrint Archive 2014
Kirsten Eisenträger Sean Hallgren Kristin E. Lauter

In this paper we present a new attack on the polynomial version of the Ring-LWE assumption, for certain carefully chosen number fields. This variant of RLWE, introduced in [BV11] and called the PLWE assumption, is known to be as hard as the RLWE assumption for 2-power cyclotomic number fields, and for cyclotomic number fields in general with a small cost in terms of error growth. For general nu...

2013
Martin R. Albrecht Daniel Cabarcas Robert Fitzpatrick Florian Göpfert Michael Schneider

We introduce software for the generation of instances of the LWE and Ring-LWE problems, allowing both the generation of generic instances and also particular instances closely-related to those arising from cryptomania proposals in the literature. Our goal is to allow researchers to attack different instances in order to assess the practical hardness of LWE and Ring-LWE. This will in turn give i...

2014
Romain Gay Pierrick Méaux Hoeteck Wee

We construct a lattice-based predicate encryption scheme for multi-dimensional range and multidimensional subset queries. Our scheme is selectively secure and weakly attribute-hiding, and its security is based on the standard learning with errors (LWE) assumption. Multi-dimensional range and subset queries capture many interesting applications pertaining to searching on encrypted data. To the b...

Journal: :Mathematics 2022

Two new approximation formulas for Bateman’s G-function are presented with strictly monotonic error functions and we deduced their sharp bounds. We also studied the completely (CM) degrees of two involving G(r), deducing its inequalities improving some recently published results.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید